[Pelis Agent Factory Advisor] Pelis Agent Factory Advisor — April 4, 2026 #1655
Closed
Replies: 1 comment
-
|
This discussion was automatically closed because it expired on 2026-04-11T03:30:49.485Z.
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
📊 Executive Summary
gh-aw-firewallhas reached Level 4 agentic maturity — a rare and impressive position. With 27 active agentic workflows spanning security red-teaming, CI investigation, token cost analytics, documentation maintenance, and smoke testing across three engines, this repository is already a showcase of the Pelis Agent Factory philosophy. However, six high-value workflow patterns from the factory are still missing, and several existing workflows have actionable enhancement opportunities — particularly around issue triage, workflow health meta-monitoring, and domain-specific security automation.🎓 Patterns Learned from Pelis Agent Factory
Key Patterns from the Documentation Site
Heterogeneous specialization — 100+ workflows, each doing one thing well. This repo has embraced this: separate Claude/Copilot/Codex smoke tests, separate token analyzers per engine, and separate secret diggers per engine.
Meta-agents that watch other agents — The Workflow Health Manager and Audit Workflows track other agent runs. The repo has CI Doctor but lacks a general health manager.
Read-only analyst + proposer separation — Some agents create reports; others propose PRs. The repo mixes both well but could better leverage the PR-proposing pattern for code quality.
Continuous improvement cadence — Daily/weekly code simplifier, refactoring, style consistency agents. The repo has weekly CLI flag checks but lacks daily code quality agents.
Causal chain automation — Issue-creating agents whose issues then trigger other agents (Issue Monster → Copilot Coding Agent). The repo uses Issue Monster well.
Cache-memory for persistent state — The Issue Duplication Detector already uses this pattern correctly.
skip-if-matchidempotency guard — Prevents duplicate open PRs/issues. Already used indoc-maintainer.mdandtest-coverage-improver.md.Strict network + safe-outputs isolation — The repo enforces this throughout, exemplary practice.
From the agentics Repository
Interesting workflows available from
githubnext/agenticsnot yet adopted:daily-test-improver.md— incremental test coverage improvementissue-triage.md— auto-label incoming issuesissue-arborist.md— link related issues as sub-issuessub-issue-closer.md— auto-close completed sub-issuesdaily-malicious-code-scan.md— scan commits for suspicious patternsgrumpy-reviewer.md/pr-nitpick-reviewer.md— automated PR quality reviewersvex-generator.md— vulnerability exchange format (very relevant for a security tool)weekly-issue-summary.md— community summary of issue activityci-coach.md— CI optimization suggestions📋 Current Agentic Workflow Inventory
build-testci-cd-gaps-assessmentci-doctorworkflow_runfailureclaude-token-optimizerclaude-token-usage-analyzercli-flag-consistency-checkercopilot-token-optimizercopilot-token-usage-analyzerdependency-security-monitordoc-maintainerfirewall-issue-dispatcherawf-labeled issues fromgh-aw→ hereissue-duplication-detectorissue-monsterpelis-agent-factory-advisorplan/planslash command → sub-issue breakdownsecret-digger-claudesecret-digger-codexsecret-digger-copilotsecurity-guardsecurity-reviewsmoke-chrootsmoke-claudesmoke-codexsmoke-copilotsmoke-servicestest-coverage-improverupdate-release-notes🚀 Actionable Recommendations
P0 — Implement Immediately
[P0] Issue Triage Agent — Auto-label Incoming Issues
What: An agent that automatically labels newly-opened issues based on content analysis.
Why: This repo receives issues from cross-repo dispatch, red team findings, CI failures, and end users. Currently issues pile up unlabeled. The factory pattern shows this is the "hello world" of agentic workflows with immediate, observable value. Given the issue tracker is already active (1600+ issues), this would improve maintainer efficiency significantly.
How: Add
issue-triage-agent.mdtriggered onissues: [opened, reopened]with categories appropriate for this repo:bug,security,enhancement,documentation,question,chroot,networking,api-proxy,smoke-test,good-first-issueEffort: Low — ~20 lines of Markdown
Example:
[P0] Add CI Doctor to Its Own Watch List + Missing Workflows
What:
ci-doctor.mdmonitors workflow failures but its own name (Pelis Agent Factory Advisor) is not in the monitored workflow list. Also missing:Smoke Services,Dependency Security Monitor, andFirewall Issue Dispatcher.Why: CI Doctor failing silently means it can't report its own failures. This is a simple 4-line fix.
How: Add the missing workflow names to the
workflows:list inci-doctor.md.Effort: Trivial — 4 lines added to existing file.
P1 — Plan for Near-Term
[P1] Daily Malicious Code Scan — Scan Commits for Suspicious Patterns
What: A daily agent that reviews recent code changes (last 24h) for suspicious patterns: hidden backdoors, hardcoded credentials, suspicious network calls, obfuscated code.
Why: This repo IS the security firewall. It's deployed by users to protect their agents. A supply-chain attack here would be catastrophic. The Pelis Agent Factory runs this daily and it's one of the most security-relevant workflows for a project of this nature. The
security-review.mdworkflow does comprehensive reviews but is broad; this agent focuses specifically on recent commit-level changes.Effort: Medium — adapt from
githubnext/agentics/workflows/daily-malicious-code-scan.md[P1] Static Analysis Report — Daily zizmor/poutine/actionlint
What: A daily agent running
zizmor,poutine, andactionlintacross all workflow files and reporting findings as a discussion.Why: The factory has created 57 analysis discussions + 12 Zizmor reports from this pattern. Given that
gh-aw-firewallgenerates.lock.ymlfiles from Markdown sources, and those lock files are what GitHub Actions executes, systematic static analysis of the generated workflows is critical.poutinedetects supply chain risks;zizmorfinds GitHub Actions security issues;actionlintcatches correctness issues. The existingsecurity-review.mdusesagentic-workflowstool but doesn't systematically run these CLI tools.Effort: Low — the
agenticworkflows-compiletool withzizmor: true, poutine: true, actionlint: trueprovides this capability.[P1] Workflow Health Manager — Meta-Agent Monitoring Workflow Health
What: A meta-agent that regularly reviews the health of all 27 agentic workflows — checking recent run success rates, identifying patterns of failure, detecting cost outliers, and creating remediation issues.
Why: Currently CI Doctor reacts to individual failures, but there's no agent that looks at trends. A workflow that was working last week but failing 60% of the time this week should get a health issue even if no single run triggered CI Doctor. The factory's Workflow Health Manager created 40 issues and 5 direct PRs + 14 causal chain PRs. This repo is complex enough to need this.
Effort: Medium — uses
agentic-workflowstool +agenticworkflows-logsfor trend analysis.[P1] Breaking Change Checker — PR Backward Compatibility Guard
What: A PR-triggered agent that detects changes to public CLI interfaces, Docker compose schemas, environment variable contracts, and iptables rule changes that could break existing users.
Why: AWF is used as a GitHub Action (
action.yml) and CLI tool by downstream users. Breaking changes to--allow-domains, container images, or env var names are high-impact. The existingsecurity-guard.mdfocuses on security posture; this would focus on user-facing compatibility. The factory pattern created alert issues like #14113 catching CLI version updates.Effort: Medium — PR-triggered, reads
action.yml,src/cli.ts,src/docker-manager.tsfor contract changes.P2 — Consider for Roadmap
[P2] Container Security Scan — Daily Docker Image CVE Scanning
What: A daily workflow that scans the three AWF Docker images (
squid,agent,api-proxy) for known CVEs using tools liketrivyorgrype, creating security issues for HIGH/CRITICAL findings.Why: The
dependency-security-monitor.mdscans npm dependencies but not the Docker base images. Theagentcontainer is based onubuntu:22.04andsquidonubuntu/squid. These base images receive security updates. Users deploying AWF trust that the containers don't contain known vulnerabilities.Effort: Medium — requires
--build-localor pulling images + running scanner tool.[P2] VEX Generator — Vulnerability Exchange Format Reports
What: An agent that generates VEX (Vulnerability Exploitability eXchange) documents for known vulnerabilities in AWF dependencies, documenting whether CVEs are actually exploitable in AWF's specific usage context.
Why: The
dependency-security-monitoralready tracks CVEs. VEX documents would formalize the security stance (e.g., "handlebars GHSA-2w6w-674q-4c4q is not exploitable because AWF doesn't process user-controlled templates in handlebars"). This is directly available from the agentics repo (vex-generator.md) and is exceptionally relevant for a security tool with open CVE issues like #1489.Effort: Low-Medium — available from
githubnext/agentics/workflows/vex-generator.md[P2] Issue Arborist — Link Related Issues as Sub-Issues
What: A periodic agent that groups related issues (e.g., all chroot-related issues, all networking issues) into parent-child relationships using GitHub's sub-issues feature.
Why: With 1600+ issues, the tracker is becoming unwieldy. The factory's Issue Arborist created 77 discussion reports and 18 parent issues. For AWF, grouping
[aw]-labeled CI failure issues, chroot issues, and networking issues would make the backlog navigable.Effort: Low — available from
githubnext/agentics/workflows/issue-arborist.md[P2] PR Reviewer / Grumpy Reviewer
What: An automated PR reviewer that provides detailed technical feedback on code changes, focusing on TypeScript correctness, Docker security, iptables rule safety, and container architecture concerns.
Why: The
security-guard.mdreviews for security posture changes. A general code quality reviewer would catch TypeScript anti-patterns, Docker best practices violations, and iptables rule errors before human reviewers spend time on them.Effort: Medium — can be adapted from
githubnext/agentics/workflows/grumpy-reviewer.md[P2] Changeset Generator — Automated Version Bumps and Changelogs
What: An agent that auto-generates version bump PRs and CHANGELOG entries for every merge to main, determining whether the change is
patch,minor, ormajorbased on the diff.Why:
update-release-notes.mdenriches notes after a release. A changeset agent would automate the decision of when to cut a release and what version to use. The factory's Changeset workflow has a 78% merge rate across 28 proposed PRs. AWF has an active release cadence.Effort: Medium — available from
github/gh-awpattern.P3 — Future Ideas
[P3] Weekly Issue Summary — Community Activity Digest
What: A weekly discussion post summarizing issue activity: new issues opened, issues closed, top contributors, trending topics.
Why: Builds community engagement and gives maintainers a weekly health check of the issue tracker. Available from
githubnext/agentics/workflows/weekly-issue-summary.md.Effort: Low
[P3] Mergefest — Auto-Merge Main into PR Branches
What: Auto-merge main into long-running PR branches to keep them up to date.
Why: With multiple AI-generated PRs in flight simultaneously (docs, test coverage, token optimization), merge conflicts accumulate. Available from the factory pattern.
Effort: Low
[P3] Sub Issue Closer — Auto-Close Completed Sub-Issues
What: When a parent issue is closed, automatically close completed sub-issues.
Why: With Issue Monster dispatching work and Issue Arborist grouping issues, sub-issues can become stale after parent resolution.
Effort: Low
[P3] Daily Repo Chronicle
What: A daily summary of notable repository activity — commits, PRs merged, issues closed — posted as a discussion.
Why: At 27 workflows running continuously, it's hard to keep track of what automated agents have done. A chronicle creates a readable log of agentic activity. Available from
githubnext/agentics/workflows/daily-repo-chronicle.md.Effort: Low
📈 Maturity Assessment
Level Scale:
Gap to Level 5:
🔄 Comparison with Pelis Agent Factory Best Practices
What This Repo Does Exceptionally Well
security-review.mdwithbash: trueand evidence-based investigation goes beyond factory normsfirewall-issue-dispatcher.mdbridginggh-aw→gh-aw-firewallis a sophisticated patternWhat Could Improve
Unique Opportunities Given This Repo's Domain
This repo is a firewall. That creates unique opportunities other repos don't have:
📝 Notes for Future Runs
Stored in
/tmp/gh-aw/cache-memory/advisor-notes-2026-04-04.jsondoc-maintainer, test coverage PRs fromtest-coverage-improverBeta Was this translation helpful? Give feedback.
All reactions