{"id":"https://openalex.org/W7150718183","doi":"https://doi.org/10.48550/arxiv.2604.02665","title":"AgentSZZ: Teaching the LLM Agent to Play Detective with Bug-Inducing Commits","display_name":"AgentSZZ: Teaching the LLM Agent to Play Detective with Bug-Inducing Commits","publication_year":2026,"publication_date":"2026-04-03","ids":{"openalex":"https://openalex.org/W7150718183","doi":"https://doi.org/10.48550/arxiv.2604.02665"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.02665","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.02665","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.02665","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5133054470","display_name":"Yunbo Lyu","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lyu, Yunbo","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002667771","display_name":"Jieke Shi","orcid":"https://orcid.org/0000-0002-0799-5018"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shi, Jieke","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027335548","display_name":"Hong Jin Kang","orcid":"https://orcid.org/0000-0001-7335-7295"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kang, Hong Jin","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009224648","display_name":"Ratnadira Widyasari","orcid":"https://orcid.org/0000-0001-8190-5458"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Widyasari, Ratnadira","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133043497","display_name":"Junda He","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"He, Junda","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133035111","display_name":"Yuqing Niu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Niu, Yuqing","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133012475","display_name":"Chengran Yang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yang, Chengran","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133019253","display_name":"Junkai Chen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Junkai","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133027300","display_name":"Zhou Yang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yang, Zhou","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040879516","display_name":"Julia Lawall","orcid":"https://orcid.org/0000-0002-1684-1264"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lawall, Julia","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5133000355","display_name":"David Lo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lo, David","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":11,"corresponding_author_ids":["https://openalex.org/A5133054470"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.602400004863739,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.602400004863739,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.32010000944137573,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.02850000001490116,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6237000226974487},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5519000291824341},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5228000283241272},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4277999997138977},{"id":"https://openalex.org/keywords/replication","display_name":"Replication (statistics)","score":0.42480000853538513},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.423799991607666},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.4083000123500824},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.3776000142097473}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7858999967575073},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6237000226974487},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5519000291824341},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5228000283241272},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4277999997138977},{"id":"https://openalex.org/C12590798","wikidata":"https://www.wikidata.org/wiki/Q3933199","display_name":"Replication (statistics)","level":2,"score":0.42480000853538513},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.423799991607666},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.4083000123500824},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.3776000142097473},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.36959999799728394},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.3569999933242798},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.35589998960494995},{"id":"https://openalex.org/C207685749","wikidata":"https://www.wikidata.org/wiki/Q2088941","display_name":"Domain knowledge","level":2,"score":0.34769999980926514},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3402999937534332},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33889999985694885},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.32659998536109924},{"id":"https://openalex.org/C105002631","wikidata":"https://www.wikidata.org/wiki/Q4833645","display_name":"Subject-matter expert","level":3,"score":0.3208000063896179},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.3066999912261963},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2989000082015991},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2964000105857849},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2948000133037567},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.27549999952316284},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.2689000070095062},{"id":"https://openalex.org/C164614171","wikidata":"https://www.wikidata.org/wiki/Q5204775","display_name":"DECIPHER","level":2,"score":0.2597000002861023},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.25769999623298645},{"id":"https://openalex.org/C100660578","wikidata":"https://www.wikidata.org/wiki/Q18733","display_name":"Recall","level":2,"score":0.2572999894618988}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.02665","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.02665","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.02665","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.02665","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6234405040740967,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,187,235],"SZZ":[1,171],"algorithm":[2],"is":[3,48,238],"the":[4,42,49,59],"dominant":[5],"technique":[6],"for":[7],"identifying":[8],"bug-inducing":[9,75,120],"commits":[10,76],"and":[11,21,69,89,118,131,138,198,208,217],"underpins":[12],"many":[13],"software":[14],"engineering":[15],"tasks,":[16],"such":[17,66,195],"as":[18,67,196],"defect":[19],"prediction":[20],"vulnerability":[22],"analysis.":[23],"Despite":[24],"numerous":[25],"variants,":[26],"including":[27],"recent":[28],"LLM-based":[29,185],"approaches,":[30],"performance":[31],"remains":[32],"limited":[33],"on":[34,41,51,160],"developer-annotated":[35],"datasets":[36,164],"(e.g.,":[37],"recall":[38,202],"of":[39,74,141,179,204],"0.552":[40],"Linux":[43],"kernel).":[44],"A":[45,143],"key":[46,156],"limitation":[47],"reliance":[50],"git":[52],"blame,":[53],"which":[54],"traces":[55],"line-level":[56],"changes":[57],"within":[58],"same":[60],"file,":[61],"failing":[62],"in":[63,192],"common":[64],"scenarios":[65,194],"ghost":[68,199],"cross-file":[70,197],"cases-making":[71],"nearly":[72],"one-quarter":[73],"inherently":[77],"untraceable.":[78],"Moreover,":[79],"current":[80],"approaches":[81],"follow":[82],"fixed":[83],"pipelines":[84],"that":[85,111,166,214],"restrict":[86],"iterative":[87],"reasoning":[88],"exploration,":[90],"unlike":[91],"developers":[92],"who":[93],"investigate":[94],"bugs":[95],"through":[96],"an":[97,108],"interactive,":[98],"multi-tool":[99],"process.":[100],"To":[101],"address":[102],"these":[103],"challenges,":[104],"we":[105],"propose":[106],"AgentSZZ,":[107],"agent-based":[109],"framework":[110],"leverages":[112],"LLM-driven":[113],"agents":[114],"to":[115,135,181,206],"explore":[116],"repositories":[117],"identify":[119],"commits.":[121],"Unlike":[122],"prior":[123,184],"methods,":[124],"AgentSZZ":[125,167],"integrates":[126],"task-specific":[127,215],"tools,":[128],"domain":[129,218],"knowledge,":[130],"a":[132],"ReAct-style":[133],"loop":[134],"enable":[136],"adaptive":[137],"causal":[139],"tracing":[140],"bugs.":[142],"structured":[144],"compression":[145,223],"module":[146],"further":[147],"improves":[148],"efficiency":[149],"by":[150,229],"reducing":[151],"redundant":[152],"context":[153],"while":[154,222],"preserving":[155],"evidence.":[157],"Extensive":[158],"experiments":[159],"three":[161],"widely":[162],"used":[163],"show":[165,213],"consistently":[168],"outperforms":[169],"state-of-the-art":[170],"algorithms":[172],"across":[173],"all":[174],"settings,":[175],"achieving":[176],"F1-score":[177],"gains":[178,203],"up":[180,205],"27.2%":[182],"over":[183,230],"approaches.":[186],"improvements":[188],"are":[189,220],"especially":[190],"pronounced":[191],"challenging":[193],"commits,":[200],"with":[201,232],"300%":[207],"60%,":[209],"respectively.":[210],"Ablation":[211],"studies":[212],"tools":[216],"knowledge":[219],"critical,":[221],"tool":[224],"outputs":[225],"reduce":[226],"token":[227],"consumption":[228],"30%":[231],"negligible":[233],"impact.":[234],"replication":[236],"package":[237],"available.":[239]},"counts_by_year":[],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2026-04-07T00:00:00"}
