Bugzy’s test-engineer subagent handles the full lifecycle of test code — generating new Playwright scripts, debugging failures, auto-fixing broken tests, and maintaining the suite as your application changes.Documentation Index
Fetch the complete documentation index at: https://www.bugzy.ai/docs/llms.txt
Use this file to discover all available pages before exploring further.
Test generation
When creating new tests, the test engineer:- Reads test cases (from markdown files or an external TMS like Zephyr Scale)
- Generates Playwright TypeScript test scripts with proper assertions
- Creates Page Object classes for reusable interactions
- Adds appropriate waits, retries, and error handling
- Tags tests with
@smoke,@regression, or custom tags
CLAUDE.md conventions and matches your style.
API testing
Bugzy supports testing REST API endpoints using Playwright’s built-inAPIRequestContext — no additional framework needed. API tests use the { request } fixture instead of { page }, so no browser is launched (making them significantly faster).
API testing capabilities include:
- Endpoint discovery — during exploration, the agent looks for OpenAPI specs, route definitions, and API documentation
- Test generation — produces API test cases alongside UI tests, using
test_layer: apimetadata - Authentication — supports Bearer tokens, API keys, and session-based auth patterns
- Error validation — tests for proper 4xx/5xx responses, error payloads, and rate limiting
- Mixed tests — combines API setup with UI verification in a single test (e.g., create data via API, verify in dashboard)
test-runs/ output structure as UI tests.
Auto-fixing
When a test fails due to a test issue (not a product bug), the test engineer automatically:Analyze the failure
Reads the error message, stack trace, and screenshots to identify the root cause.
Identify the fix
Determines whether the issue is a stale selector, a timing race, an outdated assertion, or a changed page structure.
Retry if needed
If the first fix doesn’t work, tries an alternative approach — up to 3 total attempts.
Knowledge base
The test engineer builds and consults aknowledge-base.md file that captures:
- Application structure and navigation patterns
- Common selectors and interaction patterns
- Known flaky areas and workarounds
- Corrections from disputed findings
Server-side verification (SSH)
Bugzy can verify server-side state during test execution by connecting to your servers via SSH. This catches backend issues that browser-only testing misses — incorrect log entries, failed database mutations, misconfigured services, or missing file uploads. To enable SSH verification, add these environment variables to your project (Settings > Test Data > Environment Variables):| Variable | Value | Secret? |
|---|---|---|
SSH_TEST_HOST | Your server hostname or IP (e.g., staging.example.com) | No |
SSH_TEST_USER | SSH username (e.g., deploy) | No |
SSH_TEST_KEY | Your SSH private key (full PEM block) | Yes |
SSH_TEST_PORT | SSH port (optional, default: 22) | No |
Setting up SSH keys
Setting up SSH keys
-
Create a dedicated read-only user on the target server (required):
Using
rbash(restricted bash) as the shell prevents the user from running commands with/in the path, changingPATH, or usingcdto navigate outside allowed directories. -
Restrict the user to read-only commands (required):
With
rbash+ a restrictedPATH, the user can only run the commands you’ve symlinked. Commands likerm,kill,dd, orchmodare not available — the user literally cannot execute them. -
Generate a dedicated key pair for Bugzy testing:
-
Authorize the key on the server:
-
Paste the private key (
bugzy_test_key, not.pub) into theSSH_TEST_KEYenvironment variable in Bugzy. Include the full PEM block, from-----BEGIN OPENSSH PRIVATE KEY-----to-----END OPENSSH PRIVATE KEY-----. -
Verify the restriction works:
What can the agent check?
What can the agent check?
- Application logs (
tail /var/log/app.log) - Database state (
psql -c "SELECT * FROM orders ORDER BY id DESC LIMIT 1") - Service health (
systemctl status myapp) - File uploads (
ls -la /uploads/) - Internal API endpoints (
curl http://localhost:3000/api/health) - System resources (
df -h,free -m,uptime)
Firewalled servers
Firewalled servers
If your server is not reachable from the public internet, use mcp-tunnel to establish a secure connection from the Bugzy execution environment to your internal network.
File uploads in tests
Tests that involve file uploads (profile photos, CSV imports, PDF attachments) can use the Test Data file upload feature. Upload files through the dashboard’s Test Data page and reference them via environment variables:Test maintenance
As your application evolves, existing tests may break due to UI changes, new authentication flows, or restructured pages. The test engineer handles this during every test run:- Updates selectors when elements are moved or renamed
- Adjusts assertions when expected behavior changes intentionally
- Refactors Page Objects when page structure changes significantly
OAuth test authentication
Applications that use OAuth login (Google, GitHub, Microsoft) can be tested without automating the provider’s login page. Bugzy manages OAuth tokens automatically:- Configure your OAuth app credentials in the Test Data page (client ID, client secret, scopes)
- Authorize with your test user account through a standard OAuth flow
- Run tests — Bugzy refreshes tokens automatically and injects them into the browser
Learn more
Extend test coverage
The full test generation workflow from plan to automation.
Triage failures
How failures are classified and how auto-fix fits into triage.
