[Pelis Agent Factory Advisor] Agentic Workflow Maturity Assessment — April 2026 #1789
Closed
Replies: 1 comment
-
|
This discussion was automatically closed because it expired on 2026-04-15T10:58:11.148Z.
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
📊 Executive Summary
gh-aw-firewallis a maturity-level 5 agentic repository — one of the most automated projects in the Pelis Agent Factory ecosystem, with 27 agentic workflows and 18 standard CI/CD workflows. The core patterns (triple-engine red team, token analyzer→optimizer chaining, cross-repo dispatch, smoke suites) are all well-implemented. The top opportunities are closing the Codex token-visibility gap, adding a container image security scanner, and keepingci-doctor's monitored-workflow list in sync as the workflow fleet grows.🎓 Patterns Learned vs. Current Repo
workflow_runevent chainingskip-if-matchdeduplication guardmcp-pagination,reporting,secret-audit)cache-memoryfor persistent state/plancommand📋 Workflow Inventory
Agentic Workflows (27)
smoke-claude.mdsmoke-codex.mdsmoke-copilot.mdsmoke-chroot.mdsmoke-services.md--allow-host-service-portssecret-digger-claude.mdsecret-digger-codex.mdsecret-digger-copilot.mdsecurity-guard.mdsecurity-review.mddependency-security-monitor.mdbuild-test.mdclaude-token-usage-analyzer.mdcopilot-token-usage-analyzer.mdclaude-token-optimizer.mdcopilot-token-optimizer.mddoc-maintainer.mdtest-coverage-improver.mdci-doctor.mdci-cd-gaps-assessment.mdfirewall-issue-dispatcher.mdissue-duplication-detector.mdissue-monster.mdplan.md/planslash commandcli-flag-consistency-checker.mdupdate-release-notes.mdpelis-agent-factory-advisor.mdStandard CI/CD Workflows (18)
build.yml,lint.yml,test-coverage.yml,test-integration.yml,test-chroot.yml,test-examples.yml,test-action.yml,codeql.yml,dependency-audit.yml,performance-monitor.yml,release.yml,deploy-docs.yml,docs-preview.yml,link-check.yml,pr-title.yml,copilot-setup-steps.yml,test-integration-suite.yml,agentics-maintenance.yml🚀 Recommendations
P0 — High Impact, Low Effort (Quick Wins)
1. Codex Token Usage Analyzer + Optimizer
What: Add
codex-token-usage-analyzer.mdandcodex-token-optimizer.mdmirroring the existing Claude/Copilot pair.Why: The Codex secret-digger runs hourly (3×/day more than others). Codex token costs are entirely invisible — no reporting, no optimization loop. The Claude and Copilot patterns are proven; this is a direct copy-and-adapt.
How:
Then
codex-token-optimizer.mdtriggering onworkflow_run: ["Daily Codex Token Usage Analyzer"].Effort: Low — copy claude pattern, change engine filter and labels.
2. Update
ci-doctor.mdMonitored Workflow ListWhat: Add missing workflows to the
workflow_run.workflowslist inci-doctor.md:"Smoke Services","CLI Flag Consistency Checker","Firewall Issue Dispatcher","CI/CD Pipelines and Integration Tests Gap Assessment","Smoke Services","Update Release Notes","Secret Digger (Claude)","Secret Digger (Codex)","Secret Digger (Copilot)"Why: When these workflows fail silently, no investigation issue is created. The secret-diggers are especially important — a silent failure means a gap in hourly security coverage.
Effort: Low — edit one YAML list.
P1 — High Impact, Medium Effort
3. Container Image Security Scanner Agent
What: Add
container-image-scanner.md— an agentic workflow that runs Trivy or Grype against the Docker images incontainers/(squid, agent, api-proxy) and creates issues for HIGH/CRITICAL findings.Why: The repo ships security-critical Docker containers.
codeql.ymlscans source code;dependency-audit.ymlscans npm dependencies; but nobody scans the container images themselves. A vulnerability inubuntu/squidorubuntu:22.04base images is a direct security boundary breach.How:
Agent builds images with
--build-local, runstrivy image awf-agent, parses JSON output, creates issues for HIGH+ findings.Effort: Medium — requires
--build-localin CI runner, Trivy install step.4. PR Code Quality Review Agent
What: Add
code-review.md— a general-purpose PR reviewer complementingsecurity-guard.mdwith quality/correctness focus (logic bugs, TypeScript type safety, test coverage gaps in changed files, performance anti-patterns).Why:
security-guard.mdexplicitly focuses on security posture. There is no agent reviewing PRs for general code quality, correctness, or maintainability. Given the complexity ofsrc/docker-manager.ts(1000+ lines) andsrc/cli.ts, automated quality review would catch regressions.How:
Effort: Medium — prompt engineering needed to avoid noise.
5. Performance Regression Detector Agent
What: Add an agentic layer on top of
performance-monitor.ymlthat reads benchmark results and creates GitHub issues when regressions exceed a threshold.Why:
performance-monitor.ymlruns weekly benchmarks and posts results but is a pure shell script — no intelligence, no issue creation, no trend analysis. An agent reading the JSON output could detect regressions, compare to baselines stored in cache-memory, and create actionable issues.How: Trigger on
workflow_run: ["Performance Monitor"]. Agent reads artifact JSON, compares to cached baseline in cache-memory, creates issue if startup time/memory regresses >10%.Effort: Medium — requires understanding benchmark output format.
P2 — Medium Impact
6. Stale Issue Housekeeping Agent
What: Add
stale-issue-manager.mdthat pings stale issues/PRs, applies labels, and closes truly abandoned items after extended periods.Why: As issue-monster assigns Copilot SWE agents to issues, completed or abandoned issues may accumulate. Automated housekeeping keeps the issue tracker actionable.
Effort: Medium — standard pattern, requires
issues: writepermission via safe-outputs.7. Migration Guide Generator on Release
What: Extend
update-release-notes.mdor addrelease-migration-guide.mdthat detects breaking CLI flag changes and auto-generates a migration guide as a discussion or release attachment.Why: AWF is a security tool with a CLI API. Breaking changes to flags (e.g.,
--allow-host-service-portsbehavior changes) need clear migration docs. Thecli-flag-consistency-checker.mdalready tracks flag changes weekly.Effort: Medium — chain with
cli-flag-consistency-checkeroutput or diffsrc/cli.tsbetween release tags.8. SBOM / Supply Chain Attestation Agent
What: Add
supply-chain-attestation.mdthat generates and publishes SBOMs for each release usingsyftornpm sbom, verifies SLSA provenance, and monitors for new transitive dependency additions.Why: As a security tool published to GHCR,
gh-aw-firewallshould practice what it preaches. An SBOM provides transparency for downstream users and enables supply chain auditing.Effort: Medium — SBOM generation is straightforward; verification and publishing requires release permissions.
P3 — Nice to Have
9. Integration Test Gap Agent (extend
ci-cd-gaps-assessment.md)What: Enhance the existing
ci-cd-gaps-assessment.mdto not just report gaps but also create issues with proposed test cases and assign them via issue-monster.Why: Currently it reports gaps as a discussion. Closing the loop to issue creation + Copilot assignment would make it self-healing.
Effort: Low (extend existing workflow).
10. Domain Whitelist Audit Agent
What: Add
domain-whitelist-auditor.mdthat scans all workflow.mdfiles fornetwork.alloweddomains, checks them against a known-safe list, and flags suspicious or overly broad allowances.Why: As the fleet of agentic workflows grows, network permissions can drift. An agent auditing domain allowances weekly would catch cases where workflows silently gain access to unexpected endpoints.
Effort: Low — grep-based analysis, no external calls needed.
📈 Maturity Assessment
Overall maturity: 4.3/5 — Elite tier. Two targeted gaps (Codex chain, container scanning) prevent a perfect score.
🔄 Best Practice Comparison
What This Repo Does Exceptionally Well
workflow_runtrigger pattern creating a cost-reduction feedback loop is a sophisticated and reusable pattern.mcp-pagination.md,secret-audit.md,reporting.md,version-reporting.mddemonstrate disciplined modularity.skip-if-matchguards — preventing duplicate open PRs/issues on recurring workflows is a sign of operational maturity.issue-duplication-detector.mdusing persistent cache for issue signatures is exactly the right use of that capability.What To Improve
📝 Notes
Cache updated:
repo-analysis-2026-04-08.jsonwritten to/tmp/gh-aw/cache-memory/. Next run should check for date change to detect repo drift.pelis-agent-factory-docs.txtwas not available in the workflow environment this run (hash:no-pelis-docs-available-2026-04-08).Beta Was this translation helpful? Give feedback.
All reactions