[daily regulatory] Regulatory Report - 2026-03-27 #23275
Closed
Replies: 1 comment
-
|
This report has been superseded by a newer daily regulatory report for 2026-03-29. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Today's regulatory review analyzed 11 daily report discussions from the 48-hour window of 2026-03-26 to 2026-03-27. Overall data quality is good — reports are internally consistent, metrics are well-scoped, and cross-report comparisons yield no critical discrepancies. The most notable finding is a 2× spike in today's firewall block rate (3.0%) compared to the 7-day rolling average (1.45%), driven by identifiable workflows. Two low-severity recurring warnings in the Safe Output system (missing labels, schedule-triggered PR reviews) persist without escalation. Safe output health achieved its 3rd consecutive 100% success day.
Three items merit attention: (1) the gate check 100% failure rate across all session checks, likely by-design but worth confirming; (2) the emerging EP024 detection model failure pattern (2nd consecutive day), which is silently blocking valid agent outputs; and (3) 6 firewall-enabled workflow runs missing
access.logartifacts from the prior 7-day window.📋 Full Regulatory Report
📊 Reports Reviewed
🔍 Data Consistency Analysis
Cross-Report Metrics Comparison
Reference:
scratchpad/metrics-glossary.mdfor definitions and scopes.agent_prs_total(24h)merged_prs(24h)open_issuesworkflow_runs_analyzed(7d)firewall_requests_blockedrateagent_prs_merged(24h)Scope Notes:
agent_prs_total: Copilot Agent Analysis counts only Copilot-authored PRs (24). Team Evolution counts all PR authors (Copilot 21 + github-actions 6 = 27). Different scopes by design. Not a discrepancy — the Team Evolution tracks all automation, while Agent Analysis focuses on copilot-swe-agent.workflow_runs_analyzed: Observability covers 7-day window (62 runs), Firewall Report covers single day (43 runs today). Intentionally different scopes. Not a discrepancy.Consistency Score
High Priority
1. EP024: Detection Model Not Producing THREAT_DETECTION_RESULT — 2nd Day
THREAT_DETECTION_RESULToutput on at least 4 workflow runs (Delight, Smoke Gemini, Smoke Update Cross-Repo PR, Smoke Create Cross-Repo PR). When this occurs, the entiresafe_outputsjob is skipped, meaning valid agent outputs are silently dropped.2. Firewall Block Rate Spike Today vs 7-Day Average
firewall_requests_blockedrateproxy.golang.org), AI Moderator (~9 blocks, ChatGPT/GitHub domains), Smoke Codex (~8 blocks, ChatGPT)proxy.golang.orgto Dependabot Dependency Checker's allowed domains; investigate AI Moderatorgithub.com/api.github.comblocks (see firewall report recommendation)Medium Priority
3. Observability: 6 Firewall-Enabled Runs Missing access.log (7-Day Window)
runs_with_complete_logs/ observability coverageaccess.logartifacts. This prevents post-run security auditing for those runs.firewall_enabled=trueandaccess.logis missing (as recommended in observability report)4. Gate Check Failures at 100% Rate
action_required. This has been ~60% failure rate over 30 days, but today it reached 100%.action_requiredoutcomes are intentional approval gates or broken checks. If by-design, relabel in metrics to avoid counting as "failures."Low Priority (Recurring Warnings)
5. EP_LABELS_MISSING: Missing Repository Labels — 4th Consecutive Day
constraint-solvingandproblem-of-the-daylabels that don't exist in the repository. Discussion creates successfully but labels are not applied.6. EP015: Smoke Copilot PR Review Context on Schedule Triggers — Recurring
submit_pull_request_reviewoutput without PR context. Warning only; no failure.📈 Trend Analysis
Key Trends (Today vs Historical)
Notable Trends
gh aw audit reportall shipped today — the team is in an active security maturation phase.📝 Per-Report Analysis
1. Daily Firewall Report — 2026-03-27
Source: #23226 | Run: §23644682231⚠️ Limited by single-day dataset; no multi-day trend possible yet
Time Period: 2026-03-27 only (limited early dataset — first days of firewall log collection)
Quality:
workflow_runs_analyzedfirewall_requests_totalfirewall_requests_allowedfirewall_requests_blockedfirewall_domains_blockedNotes: Block rate elevated but attributable.
proxy.golang.orgblocks for Dependabot need allowlist update.2. Copilot Agent Analysis — 2026-03-27
Source: #23225 | Run: §23644237361
Time Period: Last 24h (2026-03-26T11:33Z → 2026-03-27T11:33Z)
Quality: ✅ Valid
agent_prs_totalagent_prs_mergedagent_success_rateInternal math check: 16 merged + 3 closed + 5 open = 24 total ✅
3. Copilot Session Insights — 2026-03-27
Source: #23230 | Run: §23644187731
Time Period: 2026-03-27 snapshot
Quality: ✅ Valid
4. Safe Output Health Report — 2026-03-27
Source: #23237 | Run: §23647740710⚠️ Warnings present; EP024 detection issue noted
Time Period: Last 24h
Quality:
Notes: The 5.3% accessible log rate is a systemic observability gap, not a new issue. EP024 blocked 4 runs from getting safe outputs processed.
5. Observability Coverage Report — 2026-03-26
Source: #23187 | Run: §23623570309⚠️ 6 missing firewall logs
Time Period: Last 7 days
Quality:
workflow_runs_analyzedfirewall_enabled_workflowsruns_with_complete_logs(firewall)mcp_enabled_workflowsfirewall_requests_blockedrate6. Daily Performance Summary — 2026-03-26
Source: #23182 | Run: §23622970148
Time Period: Last 90 days
Quality: ✅ Valid
total_prsmerged_prsopen_prstotal_issues(analyzed: 1000)open_issuesclosed_issues(in period)7. Lock File Statistics — 2026-03-27
Source: #23189 | Run: §23624082605
Time Period: Snapshot as of 2026-03-27
Quality: ✅ Valid
8. Team Evolution Insights — 2026-03-27
Source: #23217 | Run: §23642767702
Time Period: Last 24h
Quality: ✅ Valid — corroborates Agent Analysis PR merge count (16)
9. DIFC Integrity-Filtered Events — 2026-03-27
Source: #23272 | Run: §23665157709
Time Period: Last 7 days
Quality: ✅ Valid
integrity_blocked100%💡 Recommendations
Process Improvements
scratchpad/metrics-glossary.mdconventions.Data Quality Actions
safe_outputsis bypassed due to detection failure.access.logfiles in the last 7 days. Implement the observability report's recommendation to fail/mark runs wherefirewall_enabled=trueand logs are absent.constraint-solvingandproblem-of-the-daylabels have been missing for 4+ days. Low effort, eliminates recurring EP_LABELS_MISSING warning.Workflow Suggestions
action_requiredpattern: Clarify whether 100%action_requiredfrom Q/Scout/Archie/cloclo is by-design. If intentional, recategorize in Session Insights to avoid false "failure" signals.📊 Regulatory Metrics
Report generated automatically by the Daily Regulatory workflow
Data sources: Daily report discussions from github/gh-aw (2026-03-26 to 2026-03-27)
Metric definitions: scratchpad/metrics-glossary.md
Previous report #23172 closed as OUTDATED
References:
Beta Was this translation helpful? Give feedback.
All reactions