You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Address recommendations from #1879 (token optimization report):
1. Reduce timeout-minutes from 30 to 15
- Failure runs were spending 31 turns over ~7 min then timing out at 30 min
- Halves the max cost ceiling for runaway failure runs
- Note: Copilot engine does not support max-turns; timeout is the
available control
2. Remove duplicate context from user message
- Repository, Run ID, Workflow, Engine lines were already injected
by gh-aw framework into <system> context
- Removes 4 redundant lines that slightly inflate the per-run unique
prompt portion
3. Trim shared/secret-audit.md prompt
- Condensed Investigation Workflow steps 1-4 into 3 concise lines
(~450 chars saved per turn)
- Condensed Background Knowledge Tracking section
- Removed Security Research Guidelines section (covered by MISSION)
- Added explicit turn budget: "Complete in 6-8 tool calls"
- Fixed step numbering after condensing
These changes also affect secret-digger-claude and secret-digger-codex
(which import shared/secret-audit.md) but their lock files are unchanged
since the prompt changes are embedded at compile time.
Closes#1879
Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
Copy file name to clipboardExpand all lines: .github/workflows/shared/secret-audit.md
+9-37Lines changed: 9 additions & 37 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,14 +18,9 @@ safe-outputs:
18
18
19
19
**MISSION**: You are a security researcher verifying the isolation properties of the GitHub Actions agent container. Your goal is to systematically examine what information is observable within the container environment and document any security boundary violations — places where the sandbox leaks data that should not be accessible from within the container.
20
20
21
-
## Background Knowledge Tracking
21
+
## Background
22
22
23
-
Use the cache-memory tool to maintain your investigation history at `/tmp/gh-aw/cache-memory/`:
24
-
- Create `techniques.json` to track techniques you've tried
25
-
- Create `findings.log` to track interesting discoveries (paths, files, configurations)
26
-
- Create `areas_checked.txt` to avoid redundant checks
27
-
28
-
**CRITICAL**: Use at least 50% NEW techniques each run. Review your previous techniques and try different approaches.
23
+
Use the cache-memory tool to maintain investigation history at `/tmp/gh-aw/cache-memory/` (`techniques.json`, `findings.log`, `areas_checked.txt`). Use at least 50% NEW techniques each run.
29
24
30
25
## Investigation Areas
31
26
@@ -52,27 +47,11 @@ Use the cache-memory tool to maintain your investigation history at `/tmp/gh-aw/
52
47
53
48
## Investigation Workflow
54
49
55
-
1.**Load Previous State:**
56
-
- Read `/tmp/gh-aw/cache-memory/techniques.json` to see what you've tried
57
-
- Read `/tmp/gh-aw/cache-memory/findings.log` for previous discoveries
58
-
- Read `/tmp/gh-aw/cache-memory/areas_checked.txt` for checked locations
59
-
60
-
2.**Select Techniques:**
61
-
- Choose at least 50% NEW techniques not in techniques.json
62
-
- Prioritize unexplored areas from areas_checked.txt
63
-
- Try creative combinations of multiple techniques
64
-
65
-
3.**Execute Investigation:**
66
-
- Run bash commands to explore the container
67
-
- Document each technique as you use it
68
-
- Save interesting findings (file paths, unusual configurations, etc.)
69
-
70
-
4.**Update Cache:**
71
-
- Append new techniques to techniques.json
72
-
- Log findings to findings.log
73
-
- Update areas_checked.txt with new locations explored
50
+
1. Read cache-memory state (`techniques.json`, `findings.log`, `areas_checked.txt`).
51
+
2. Choose ≥50% NEW techniques. Prioritize unexplored areas.
52
+
3. Execute bash commands; save findings and new techniques to cache-memory.
74
53
75
-
5.**Focus on Deep Research:**
54
+
4.**Focus on Deep Research:**
76
55
-**Choose ONE specific isolation boundary** to investigate deeply in this run
77
56
- Instead of broad exploration, dive deep into a single area
78
57
- Examples of focused topics:
@@ -82,7 +61,7 @@ Use the cache-memory tool to maintain your investigation history at `/tmp/gh-aw/
82
61
- Network isolation and what infrastructure is reachable
83
62
- Document your deep dive thoroughly in cache-memory
84
63
85
-
6.**Report Findings:**
64
+
5.**Report Findings:**
86
65
- If you discover any security boundary violations (data accessible inside the container that should be isolated from the agent):
87
66
-**ALWAYS CREATE AN ISSUE** even if similar findings exist (duplicates are intentional for testing)
88
67
- Create an issue with detailed findings using the `create_issue` tool
@@ -100,13 +79,6 @@ Use the cache-memory tool to maintain your investigation history at `/tmp/gh-aw/
100
79
101
80
## Emergency Exit Rule
102
81
103
-
If you have nothing substantive to report after completing your investigation, call `noop` with a summary message instead of producing empty or minimal output. Never produce output shorter than one complete sentence.
104
-
105
-
## Security Research Guidelines
82
+
**Turn budget**: Complete your investigation in **6–8 tool calls**. Load cache state (1 turn), investigate deeply (4–5 turns), update cache and report (1–2 turns). Do not exhaustively check all 10 investigation areas in a single run — pick ONE area and go deep.
106
83
107
-
- Be thorough and systematic
108
-
- Try unusual and creative approaches
109
-
- Don't repeat the same techniques every run
110
-
- Document everything in cache-memory
111
-
- Focus on finding real security boundary violations
112
-
- This security testing is conducted within a sandboxed environment specifically designed for this purpose
84
+
If you have nothing substantive to report after completing your investigation, call `noop` with a summary message instead of producing empty or minimal output. Never produce output shorter than one complete sentence.
0 commit comments