[Pelis Agent Factory Advisor] Agentic Workflow Maturity Assessment & Recommendations — April 2026 #1969
Replies: 3 comments
-
|
This discussion was automatically closed because it expired on 2026-04-20T21:45:50.556Z.
|
Beta Was this translation helpful? Give feedback.
-
|
🔮 The ancient spirits stir in the firewall logs. Warning
|
Beta Was this translation helpful? Give feedback.
-
|
🔮 The ancient spirits stir, and the smoke-test agent has walked this thread. Warning
|
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
📊 Executive Summary
gh-aw-firewallis one of the most mature agentic workflow repositories observed, operating at maturity level 4.5/5 with 27 agentic workflows spanning security, smoke testing, documentation, issue management, and cost optimization. The top opportunities are: adding a container image CVE scanner for GHCR-published images, scheduling the secret-digger workflows to run automatically rather than manually, and creating a codex token optimizer to match the existing claude/copilot optimization pipeline.🎓 Patterns Learned (Pelis Agent Factory vs. This Repo)
skip-if-matchguardsworkflow_runchainingshared/secret-audit.md,shared/reporting.md,shared/mcp/gh-aw.mdthreat-detection: falseexpires:on auto-created issuesroles: allfor PR triggersreaction:event trigger📋 Workflow Inventory
security-guardsecurity-reviewdependency-security-monitorsecret-digger-claudesecret-digger-codexsecret-digger-copilotsmoke-claudesmoke-copilotsmoke-codexsmoke-chrootsmoke-servicesbuild-testtest-coverage-improverci-doctorworkflow_runfailureci-cd-gaps-assessmentagentic-workflowsMCPdoc-maintainerskip-if-matchguard;network.allowedcli-flag-consistency-checkerupdate-release-notesreleaseeventissue-monsterissue-duplication-detectorfirewall-issue-dispatchergh-awissues → this repoclaude-token-usage-analyzerclaude-token-optimizerworkflow_runfrom analyzercopilot-token-usage-analyzercopilot-token-optimizerworkflow_runfrom analyzerplanslash_commandpelis-agent-factory-advisor🚀 Recommendations
P0 — High Impact, Low Effort (Implement immediately)
1. Schedule Secret Digger Workflows Weekly
What: Add
schedule: weeklytosecret-digger-claude.md,secret-digger-codex.md, andsecret-digger-copilot.md.Why: These red-team agents are among the most valuable security assets in the repo — they actively probe container isolation boundaries. Running them only manually means new code changes can silently degrade isolation for weeks. The
shared/secret-audit.mdalready rotates techniques via cache-memory.How: Add to each secret-digger frontmatter:
Effort: 5 minutes × 3 files. Risk: Low — skip-if-match prevents flooding.
2. Add Codex Token Optimizer
What: Create
codex-token-usage-analyzer.mdandcodex-token-optimizer.mdto match the existing Claude/Copilot optimization pipeline.Why: Three AI engines are used (claude, codex, copilot) and codex is the only one without cost instrumentation. Codex runs are used in smoke tests, build tests, and the secret digger — unmonitored costs accumulate.
How: Clone
copilot-token-usage-analyzer.md→codex-token-usage-analyzer.md, substitutecopilot→codexandGH_AW_MODEL_COPILOT→GH_AW_MODEL_CODEX. Chain the optimizer the same way.Effort: ~30 minutes (copy + adapt two files). Risk: Minimal.
P1 — High Impact, Medium Effort (Near-term)
3. Container Image CVE Scanner
What: New agentic workflow
container-image-security.mdthat scans GHCR-published Docker images (awf-squid,awf-agent,awf-api-proxy) for CVEs using Trivy or Grype.Why: The repo publishes container images to GHCR on every release. Base images (
ubuntu/squid:latest,ubuntu:22.04) accumulate CVEs over time. There is adependency-audit.ymlfor npm packages andcodeql.ymlfor source code, but no container layer scanning. This is a critical gap for a security product.How:
Agent pulls each image from GHCR, runs
trivy image(already available on GitHub runners), parses HIGH/CRITICAL findings, and creates issues.Effort: ~2 hours. Risk: Low — read-only GHCR pull + issue creation.
4. Domain Whitelist Auditor
What: New weekly workflow
domain-whitelist-auditor.mdthat reviews domains innetwork.allowedacross all workflow.mdfiles and checks whether each domain is still justified.Why: AWF is a firewall product — its own CI workflows should model minimal egress. Over time, network allowlists in workflows accumulate domains that were added for one-time reasons but never removed. This is especially embarrassing for a firewall tool.
How: Agent reads all
.github/workflows/*.mdfiles, extractsnetwork.alloweddomains, cross-references them against what each workflow actually needs based on its tools/commands, and creates a discussion report flagging over-permissive entries.Effort: ~2 hours. Risk: Low — read-only, creates discussion not issues.
5. Performance Regression Agentic Analyst
What: New workflow
performance-regression-analyzer.mdthat reads the output ofperformance-monitor.yml(which already runs) and interprets results, creates issues for regressions, and proposes fixes.Why:
performance-monitor.ymlgenerates benchmark data but doesn't create actionable follow-up. Benchmarks only add value when regressions are automatically surfaced and addressed.How: Trigger via
workflow_runonPerformance Monitor, read benchmark artifacts, compare against baseline stored in cache-memory, create issues for >10% regressions with specific optimization suggestions.Effort: ~3 hours. Risk: Low.
6. Release Readiness Checklist Agent
What: New workflow
release-readiness.mdthat runs on PRs targetingmainwith[release]or version bump commits, checking that: CHANGELOG is updated, container images are tested, all smoke tests pass, docs are current, and release notes draft exists.Why:
update-release-notes.mdruns after release, but there's no pre-release gate. For a security product, a missed changelog entry or untested container can cause serious user trust issues.How: Triggered on push to main or
workflow_dispatchwith version parameter. Agent queries recent CI runs, checks doc freshness, validates CHANGELOG, creates a release-readiness issue/comment.Effort: ~3 hours. Risk: Low.
P2 — Medium Impact
7. Stale Issue Closer
What: Weekly
stale-issue-triage.mdthat identifies issues with no activity in 30+ days, comments asking for status, and closes if no response in 7 days.Why:
issue-monster.mdcreates Copilot-assigned PRs but doesn't clean up stale issues when PRs are abandoned. Over time, unresolved issues inflate the backlog.Effort: ~1 hour. Risk: Low with dry-run option first.
8. PR Quality Reviewer for AWF PRs
What: Extend
security-guard.mdor create a companionpr-quality-reviewer.mdthat checks PRs for: test coverage of changed code, documentation updates for new CLI flags, and network allowlist additions.Why: Currently
security-guardonly reviews security weakening. A quality reviewer would catch cases where new features lack tests or docs — complementing the existing weeklycli-flag-consistency-checker.Effort: ~2 hours. Risk: Low — add-comment only.
P3 — Nice to Have
9. Auto-Merge Agent for Copilot-Created PRs
What: Workflow that monitors draft PRs created by
copilot-swe-agent, promotes them from draft when CI passes, and requests review.Why:
issue-monster.mdauto-assigns issues but human review is still needed to merge. An auto-promote-from-draft step would streamline the flow.Effort: Medium. Risk: Medium — needs careful branch protection integration.
10. CI Doctor Workflow Auto-Discovery
What: Enhance
ci-doctor.mdto auto-discover monitored workflows from the repository's workflow files rather than maintaining a hardcoded list.Why: The current
ci-doctor.mdhas 25+ hardcoded workflow names. Every new workflow added to the repo requires a manual update to CI Doctor'sworkflows:list, or it won't be monitored for failures.How: Add a pre-agent step that runs
gh workflow list --json nameand populates the watched list dynamically, or use a separate.github/workflows/ci-doctor-workflows.ymlthat generates the list.Effort: ~2 hours. Risk: Low.
📈 Maturity Assessment
🔄 Best Practice Comparison
What this repo does exceptionally well
workflow_runchaining — The token analyzer → optimizer pipeline is a textbook Pelis factory pattern. Triggers are data-driven, not time-driven.threat-detection: false. For a security product's own CI, false positives from safe-outputs threat detection would be costly.skip-if-matchdiscipline — Consistently prevents duplicate issues/PRs from automation, a common failure mode in other repos.shared/secret-audit.md,shared/reporting.md, andshared/mcp/gh-aw.mdreduce duplication across all three secret-digger variants and other workflows.reaction: "heart"/reaction: "rocket"for interactive re-triggering is a sophisticated UX touch rarely seen elsewhere.expires:on auto-issues — Prevents stale automation issues from polluting the backlog.What to improve
ci-doctor.mdwill silently miss new workflows added to the repo.performance-monitor.ymlgenerates data but no agent interprets and acts on it.📝 Notes
Cache-memory updated with:
cdd0a0ce84f26f5119f7edac2510378b84c221c9fe2515d48c25d44f63f6f075Items to watch next run:
secret-digger-*.mdschedule added?codex-token-optimizer.mdcreated?Generated by Pelis Agent Factory Advisor on 2026-04-13.
Beta Was this translation helpful? Give feedback.
All reactions