[Pelis Agent Factory Advisor] Agentic Workflow Maturity Report – March 2026 #1381
Closed
Replies: 1 comment
-
|
This discussion was automatically closed because it expired on 2026-03-27T03:26:02.059Z.
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
📊 Executive Summary
This repository has an impressive and mature agentic workflow setup with 21 compiled workflows covering security, testing, documentation, CI/CD, and issue management — far above most repositories. The top opportunities center on issue triage automation (currently missing a basic triage agent), PR-fix ChatOps, workflow health meta-monitoring, and domain-specific firewall validation workflows that would leverage the unique security expertise of this codebase.
🎓 Patterns Learned from Pelis Agent Factory
Key Patterns from the Documentation Site
skip-if-matchfrontmatter/pr-fixto fix failing CIKey Patterns from the Agentics Repository
The
githubnext/agenticsrepository contributes these notable patterns:daily-test-improver– Incremental test gap filling, one area per daydaily-backlog-burner– Work through issues systematically, one per daypr-nitpick-reviewer– Thorough quality gating before mergegrumpy-reviewer– Adversarial review perspectivecontribution-guidelines-checker– Validates PRs against CONTRIBUTING.mdComparison with Current Implementation
This repository already applies many advanced patterns: multi-engine smoke tests (Claude, Codex, Copilot), hourly red-team secret scanning with 3 engines,
cache-memoryfor persistence, shared workflow imports, and domain-specific security guards. The main gap versus the factory is the absence of issue management/triage and meta-observability workflows.📋 Current Agentic Workflow Inventory
build-testci-cd-gaps-assessmentci-doctorworkflow_runfailurecli-flag-consistency-checkerdependency-security-monitordoc-maintainerissue-duplication-detectorissue-monsterpelis-agent-factory-advisorplansecret-digger-claude/codex/copilotsecurity-guardsecurity-reviewsmoke-chroot/claude/codex/copilottest-coverage-improverupdate-release-notesCoverage: 38.39% overall.
cli.tsat 0%,docker-manager.tsat 18% — major gap in core code.🚀 Actionable Recommendations
P0 – Implement Immediately
[P0] Issue Triage Agent
What: Automatically label incoming issues (
bug,feature,enhancement,documentation,question,security,help-wanted) when they are opened.Why: This repository has an active issue tracker but zero automatic labeling. The Pelis Factory's most-cited "hello world" workflow — simple to build, immediate value. The
issue-monsterdispatcher would also benefit from pre-labeled issues.How: Add
issue-triage-agent.mdtriggered onissues: [opened, reopened]using GitHub issues toolset +safe-outputs: add-labels. Given this is a public security tool, keeplockdown: true(default).Effort: Low (< 1 hour to add and compile)
Example:
[P0] Daily Firewall Domain Audit (Domain-Specific)
What: A workflow that validates the actual domain allowlist/blocklist enforcement by running
awfsmoke test invocations and reporting which domains are correctly allowed/blocked.Why: This is the core security product — domain filtering. A daily automated audit using the built-in
awf logs statsand test harness would catch regressions in domain ACL logic that existing unit tests miss. This is unique to this repo and would directly validate the product's primary security guarantee.How: Triggered daily, runs
awf --allow-domains example.com -- curl https://github.comand validates the access log to confirm github.com was blocked. Creates a discussion with firewall validation results.Effort: Medium (2-3 hours, requires understanding the test fixtures)
P1 – Plan for Near-Term
[P1] PR Fix Slash Command
What: A
/pr-fixslash command that, when invoked in a PR comment, analyzes failing CI checks and attempts to automatically fix them.Why: The Pelis Factory's
pr-fixworkflow has high utility — when CI fails on a PR, the author can type/pr-fixinstead of debugging manually. Especially valuable for the complex build pipeline here (TypeScript compilation + container tests + lint).How:
slash_command: pr-fixin workflow, reads the failing job logs via GitHub Actions tools, proposes a PR fix.Effort: Low-Medium
[P1] Workflow Health Manager (Meta-Agent)
What: A daily meta-agent that monitors the health of all other agentic workflows — checking for failures, cost anomalies, workflows that haven't run, and degraded output quality.
Why: With 21 workflows running, a meta-observer is essential. In the Pelis Factory, this pattern created 40 issues and 34 merged PRs. It catches workflows that are silently failing or producing low-quality output.
How: Daily schedule, uses
agentic-workflowsMCP to audit recent runs,cache-memoryto track trends, creates issues for degraded workflows.Effort: Medium
[P1] Breaking Change Checker
What: On every PR, detect CLI flag removals, API breaking changes, and Docker Compose config changes that would break existing users.
Why: This is a CLI tool with external users. Breaking changes to
--allow-domains,--build-local, etc. are high-impact. The Pelis Factory's equivalent created alert issues that caught production-breaking changes. Given the security implications here (misconfigured firewall = security bypass), catching these early is critical.How:
pull_requesttrigger, checks for removed CLI options, changed Docker network config, modified iptables rules. Creates a comment on the PR if breaking changes detected.Effort: Low-Medium
[P1] Automated Changeset / Version Bump
What: When a PR is merged to main, automatically analyze commits and create a PR proposing the appropriate semantic version bump and CHANGELOG entry.
Why: The
update-release-notesworkflow runs onrelease: published, but there's no automation to determine the right version bump. The Pelis Factory'schangesetworkflow had a 78% merge rate (22/28 PRs merged). This reduces the "what version should this be?" decision friction.How: Triggered on push to main, analyzes commits for
feat:,fix:,BREAKING CHANGE:markers, proposes semver bump in a PR.Effort: Medium
P2 – Consider for Roadmap
[P2] Daily Malicious Code Scan
What: Daily review of commits from the past 24 hours for suspicious code patterns (credential harvesting, backdoors, obfuscated code, suspicious network calls).
Why: This is a security tool with an npm package and Docker images. Supply chain attacks are a real threat. The Pelis Factory runs this daily. Given this repo protects AI agent network access, any compromise would be high-impact.
How: Daily schedule, uses
git log --since="24 hours ago"+ code review of changed files.Effort: Low (can remix from gh-aw factory)
[P2] PR Nitpick Reviewer
What: A thorough quality reviewer that checks PRs for: missing tests, documentation gaps, error handling gaps, and TypeScript type safety issues.
Why: The existing
security-guardfocuses on security; a separate quality reviewer would catch non-security issues. The Pelis Factory's equivalent had consistent quality improvements.How:
pull_requesttrigger, separate fromsecurity-guard, usesbashtools to run lint/type-check.Effort: Low
[P2] Weekly Repository Chronicle
What: Weekly summary of repository activity — PRs merged, issues opened/closed, workflow success rates, coverage trends.
Why: Keeps maintainers informed of project velocity without manual tracking. The
daily-repo-chroniclein agentics created useful weekly status reports.How: Weekly schedule, queries GitHub API for weekly activity, posts a discussion summary.
Effort: Low
[P2] Documentation Noob Tester
What: Periodically test the documentation from a "first-time user" perspective — can a new user follow the Quick Start guide? Are the examples accurate?
Why: The docs site (
docs-site/) is Astro/Starlight, and the repo has extensive documentation. The Pelis Factory's noob tester had a 43% merge rate but surfaced real usability issues. For a security tool, documentation accuracy directly impacts secure usage.How: Weekly schedule, simulates following Quick Start instructions, tests code examples.
Effort: Medium (requires bash tools to run commands)
[P2] GitHub Actions Updater
What: Weekly check for outdated action pins (SHA-pinned actions that have newer versions).
Why: The repo uses SHA-pinned actions (security best practice) but those pins go stale. The Pelis Factory's
daily-workflow-updaterkept actions current. Currently dependency-security-monitor covers npm/dependencies but not action pins.How: Weekly schedule, checks action versions, creates PR with updated SHA pins.
Effort: Low-Medium
P3 – Future Ideas
[P3] Issue Arborist
What: Periodically link related issues as parent/sub-issues, building a dependency tree.
Why: With active issue tracking and complex interrelated features, organizing issues into trees would help with project planning. The Pelis Factory's arborist created 18 parent issues grouping related work.
Effort: Medium
[P3] Repo-Ask ChatOps
What: A
/askslash command that answers questions about the codebase — "How does the HTTPS proxy work?", "What domains are allowlisted by default?".Why: The codebase has complex architecture (three containers, iptables, Squid). A ChatOps Q&A would reduce friction for contributors and users. The
repo-askpattern from agentics is a good template.Effort: Low
[P3] Container Drift Detector
What: Daily comparison of container security configurations against a known-good baseline.
Why: This is the most unique opportunity for this repo. Drift in
seccomp-profile.json, capability dropping, or iptables setup could silently weaken the firewall. No other repo in the factory has this — it would be a novel contribution.Effort: Medium
[P3] Grumpy Reviewer
What: An adversarial PR reviewer that specifically tries to find security weaknesses and challenges assumptions.
Why: The
security-guardis constructive; a "grumpy" variant would be more adversarial and challenge design decisions. Given the security domain, an adversarial reviewer adds unique value.Effort: Low
📈 Maturity Assessment
Current Level: 3.5/5 — Significantly above average, with exceptional security-specific coverage. Gaps are primarily in issue management basics and meta-observability.
Target Level: 4.5/5 — Achievable by adding issue triage (P0), PR-fix slash command (P1), workflow health manager (P1), and 2-3 P2 items.
Gap: ~5-7 new workflows needed to reach target level.
🔄 Comparison with Pelis Agent Factory Best Practices
What This Repo Does Well
shared/workflow fragments for pagination, reporting, etc.skip-if-matchproperly prevents parallel run conflictsWhat It Could Improve
Unique Opportunities (Domain: Security/Firewall)
The factory has no firewall/network security tool workflows. This repo could pioneer:
Analysis based on 21 existing agentic workflows and patterns from Pelis Agent Factory (19-part series) and githubnext/agentics repository. Cache-memory updated at
/tmp/gh-aw/cache-memory/pelis-advisor-notes.json.Beta Was this translation helpful? Give feedback.
All reactions