{"id":"https://openalex.org/W7138274375","doi":"https://doi.org/10.48550/arxiv.2603.13428","title":"EvoClaw: Evaluating AI Agents on Continuous Software Evolution","display_name":"EvoClaw: Evaluating AI Agents on Continuous Software Evolution","publication_year":2026,"publication_date":"2026-03-13","ids":{"openalex":"https://openalex.org/W7138274375","doi":"https://doi.org/10.48550/arxiv.2603.13428"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.13428","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.13428","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.13428","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010719346","display_name":"Gangda Deng","orcid":"https://orcid.org/0000-0002-6827-0256"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Deng, Gangda","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013289027","display_name":"Zhaoling Chen","orcid":"https://orcid.org/0009-0000-0041-5255"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Zhaoling","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129749965","display_name":"Zhongming Yu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yu, Zhongming","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129665524","display_name":"Haoyang Fan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fan, Haoyang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129728024","display_name":"Yuhong Liu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liu, Yuhong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129750243","display_name":"Yuxin Yang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yang, Yuxin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129724643","display_name":"Dhruv Parikh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Parikh, Dhruv","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008436370","display_name":"Rajgopal Kannan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kannan, Rajgopal","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129724709","display_name":"Le Thi Nhi Cong","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cong, Le","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129699271","display_name":"Mengdi Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Mengdi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129752775","display_name":"Qian Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Qian","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033166029","display_name":"Viktor K. Prasanna","orcid":"https://orcid.org/0000-0002-1609-8589"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Prasanna, Viktor","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129666209","display_name":"Xiangru Tang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tang, Xiangru","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5023449213","display_name":"Xingyao Wang","orcid":"https://orcid.org/0000-0002-9502-4472"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Xingyao","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":14,"corresponding_author_ids":["https://openalex.org/A5010719346"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.30630001425743103,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.30630001425743103,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.26190000772476196,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.13189999759197235,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.6736999750137329},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5443000197410583},{"id":"https://openalex.org/keywords/software-evolution","display_name":"Software evolution","score":0.501800000667572},{"id":"https://openalex.org/keywords/commit","display_name":"Commit","score":0.4706000089645386},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.4124999940395355},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.3937000036239624},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.3849000036716461},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.367000013589859},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.3634999990463257},{"id":"https://openalex.org/keywords/software-maintenance","display_name":"Software maintenance","score":0.36309999227523804}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.715499997138977},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.6736999750137329},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5552999973297119},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5443000197410583},{"id":"https://openalex.org/C202105479","wikidata":"https://www.wikidata.org/wiki/Q265013","display_name":"Software evolution","level":5,"score":0.501800000667572},{"id":"https://openalex.org/C153180980","wikidata":"https://www.wikidata.org/wiki/Q19776675","display_name":"Commit","level":2,"score":0.4706000089645386},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.4124999940395355},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.3937000036239624},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.3849000036716461},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.367000013589859},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.3634999990463257},{"id":"https://openalex.org/C101317890","wikidata":"https://www.wikidata.org/wiki/Q940053","display_name":"Software maintenance","level":4,"score":0.36309999227523804},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36039999127388},{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.3598000109195709},{"id":"https://openalex.org/C2779231336","wikidata":"https://www.wikidata.org/wiki/Q7534724","display_name":"Sketch","level":2,"score":0.34529998898506165},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.3416999876499176},{"id":"https://openalex.org/C120060458","wikidata":"https://www.wikidata.org/wiki/Q10145","display_name":"Milestone","level":2,"score":0.32109999656677246},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.3167000114917755},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3138999938964844},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.30869999527931213},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2980000078678131},{"id":"https://openalex.org/C100776233","wikidata":"https://www.wikidata.org/wiki/Q2532492","display_name":"Bridge (graph theory)","level":2,"score":0.29649999737739563},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2863999903202057},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.2849000096321106},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.2786000072956085},{"id":"https://openalex.org/C207850805","wikidata":"https://www.wikidata.org/wiki/Q269608","display_name":"Reverse engineering","level":2,"score":0.2712000012397766},{"id":"https://openalex.org/C5894958","wikidata":"https://www.wikidata.org/wiki/Q2297769","display_name":"Software agent","level":2,"score":0.27059999108314514},{"id":"https://openalex.org/C174683762","wikidata":"https://www.wikidata.org/wiki/Q609588","display_name":"Component-based software engineering","level":4,"score":0.267300009727478},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.2662999927997589},{"id":"https://openalex.org/C152752567","wikidata":"https://www.wikidata.org/wiki/Q116877","display_name":"Code refactoring","level":3,"score":0.26460000872612},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.26350000500679016},{"id":"https://openalex.org/C41550386","wikidata":"https://www.wikidata.org/wiki/Q529909","display_name":"Multi-agent system","level":2,"score":0.26109999418258667},{"id":"https://openalex.org/C74072328","wikidata":"https://www.wikidata.org/wiki/Q1142726","display_name":"Intelligent agent","level":2,"score":0.26010000705718994},{"id":"https://openalex.org/C76518257","wikidata":"https://www.wikidata.org/wiki/Q271680","display_name":"Software framework","level":5,"score":0.2572999894618988},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.2524999976158142}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.13428","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.13428","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.13428","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.13428","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"With":[0],"AI":[1],"agents":[2,29,85],"increasingly":[3],"deployed":[4],"as":[5,70],"long-running":[6],"systems,":[7],"it":[8],"becomes":[9],"essential":[10],"to":[11,19,86,128],"autonomously":[12],"construct":[13],"and":[14,39,90,142],"continuously":[15],"evolve":[16],"customized":[17],"software":[18,45,97],"enable":[20,78],"interaction":[21],"within":[22],"dynamic":[23],"environments.":[24],"Yet,":[25],"existing":[26],"benchmarks":[27],"evaluate":[28],"on":[30,125],"isolated,":[31],"one-off":[32],"coding":[33],"tasks,":[34],"neglecting":[35],"the":[36],"temporal":[37],"dependencies":[38],"technical":[40],"debt":[41],"inherent":[42],"in":[43,132],"real-world":[44],"evolution.":[46],"To":[47],"bridge":[48],"this":[49],"gap,":[50],"we":[51],"introduce":[52],"DeepCommit,":[53],"an":[54],"agentic":[55],"pipeline":[56],"that":[57,83],"reconstructs":[58],"verifiable":[59],"Milestone":[60],"DAGs":[61],"from":[62,101,123],"noisy":[63],"commit":[64],"logs,":[65],"where":[66],"milestones":[67],"are":[68],"defined":[69],"semantically":[71],"cohesive":[72],"development":[73],"goals.":[74],"These":[75],"executable":[76],"sequences":[77],"EvoClaw,":[79],"a":[80,115],"novel":[81],"benchmark":[82],"requires":[84],"sustain":[87],"system":[88],"integrity":[89],"limit":[91],"error":[92,143],"accumulation,":[93],"dimensions":[94],"of":[95,106],"long-term":[96,140],"evolution":[98],"largely":[99],"missing":[100],"current":[102],"benchmarks.":[103],"Our":[104],"evaluation":[105],"12":[107],"frontier":[108],"models":[109],"across":[110],"4":[111],"agent":[112],"frameworks":[113],"reveals":[114],"critical":[116],"vulnerability:":[117],"overall":[118],"performance":[119],"scores":[120],"drop":[121],"significantly":[122],"$&gt;$80%":[124],"isolated":[126],"tasks":[127],"at":[129],"most":[130],"38%":[131],"continuous":[133],"settings,":[134],"exposing":[135],"agents'":[136],"profound":[137],"struggle":[138],"with":[139],"maintenance":[141],"propagation.":[144]},"counts_by_year":[],"updated_date":"2026-03-18T06:31:55.123368","created_date":"2026-03-18T00:00:00"}
