[Pelis Agent Factory Advisor] Agentic Workflow Advisor Report — March 2026 #1394
Closed
Replies: 1 comment
-
|
This discussion was automatically closed because it expired on 2026-03-29T03:32:40.690Z.
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
📊 Executive Summary
gh-aw-firewallhas an impressively mature agentic workflow ecosystem with 16 specialized agentic workflows covering security, CI/CD, documentation, and issue management — well above average for a project of this size. The most significant gap is the absence of issue triage/labeling (creating a broken pipeline feeding the Issue Monster) and meta-workflow observability (no agent monitoring the agents themselves). Closing these two gaps would unlock substantial multiplier value from the existing workflow investment.🎓 Patterns Learned from Pelis Agent Factory
The Pelis Agent Factory (100+ workflows in
github/gh-aw) revealed several key patterns directly applicable here:1. Specialization over monoliths — Many focused agents outperform one "do everything" agent. This repo already follows this pattern well.
2. Causal chain automation — The most effective setups chain agents: Triage labels an issue → Issue Monster assigns it → Copilot fixes it → CI Doctor validates the fix. This repo has the middle and end of the chain but is missing the labeling step at the start.
3. Meta-agents are invaluable — The Pelis Factory's Workflow Health Manager created 40 issues and 5 direct + 14 causal PRs by monitoring other workflows. This repo has no equivalent.
4. Trust but verify — Continuous testing workflows (Daily Test Improver, CI Coach) with high merge rates (100%) show that validation-focused agents are extremely reliable. This repo's weekly test-coverage-improver could be expanded.
5. Documentation quality multipliers — Daily Doc Updater in the Pelis Factory achieved a 96% PR merge rate (57/59 merged). This repo's doc-maintainer runs daily but could be enhanced with validation.
6. Domain-specific security workflow — The Pelis Factory runs a dedicated "Firewall" agent to test its own network security. This repo is a firewall — it has excellent security workflows, but no agent specifically testing the AWF firewall from a user perspective.
Comparison with
githubnext/agentics: The agentics reference repo includes workflows likedaily-test-improver,daily-repo-chronicle,weekly-issue-summary, andgrumpy-reviewerthat are absent here. Theci-doctor.mdin agentics directly inspired this repo's implementation.📋 Current Agentic Workflow Inventory
issue-monsterissues: opened, hourlyissue-duplication-detectorissues: openedci-doctorworkflow_run: completedsecurity-reviewsecurity-guardsecret-digger-claudesecret-digger-codexsecret-digger-copilotdoc-maintainertest-coverage-improverdependency-security-monitorcli-flag-consistency-checkerci-cd-gaps-assessmentupdate-release-notesrelease: publishedplan/plancommentbuild-testsmoke-claude/codex/copilot/chrootpelis-agent-factory-advisor🚀 Actionable Recommendations
P0 — Implement Immediately
🏷️ Issue Triage / Labeling Agent
What: An automated workflow that labels new issues with appropriate tags (
bug,enhancement,security,documentation,good-first-issue,no-bot, etc.).Why: The Issue Monster explicitly skips issues without recognized labels (it looks for
bug,enhancement,feature,security, etc.). Currently, no workflow applies these labels, meaning Issue Monster has limited effectiveness. A triage agent closes this gap and creates a complete automation pipeline: Label → Assign → Fix.How: Trigger on
issues: [opened, reopened]. Analyze issue title/body, apply one label from the allowed set, leave a brief comment explaining the label choice.Effort: Low — this is the Pelis Factory "hello world" pattern, well-documented and straightforward to implement.
Example:
📊 Workflow Health Manager (Meta-Agent)
What: A daily/weekly agent that monitors all other agentic workflows in this repository — checking if they're succeeding, trending toward failures, producing expected outputs, and remaining within cost/time budgets.
Why: This repo now has 16+ agentic workflows. Without observability, degraded workflows go unnoticed. The Pelis Factory's Workflow Health Manager created 40 issues and 19 merged PRs just by watching other workflows. As this workflow collection grows, meta-observability becomes essential.
How: Use the
agentic-workflowstool to pull run history. Identify workflows with high failure rates, stalled outputs (no recent discussions/issues/PRs), or anomalous runtimes. Create issues for problems found.Effort: Low-Medium — can use existing
agentic-workflowstool and cache-memory for trending data.P1 — Plan for Near-Term
🔄 Breaking Change Checker
What: A workflow that triggers on PRs and analyzes changes to CLI flags, public API shapes, and container behavior for backward-incompatible changes.
Why: AWF is a developer tool integrated into CI/CD pipelines. Breaking changes (removed flags, changed defaults, renamed Docker images) cause real downstream failures for users. The Pelis Factory's Breaking Change Checker catches these before they reach production. This repo has a CLI Flag Consistency Checker, but that checks docs, not backward compatibility.
How: On PR, compare changed
src/cli.tsoptions against the previous version. Flag removed flags, changed argument types, and renamed outputs. Check container interface changes (entrypoint args, environment variables).Effort: Medium — requires careful analysis logic, but the Pelis Factory pattern is well-established.
🔍 Container Security Audit Agent
What: A periodic agent that deeply audits the Docker container configurations (
containers/squid/,containers/agent/,containers/api-proxy/) for security misconfigurations, outdated base images, and dangerous patterns.Why: This repo is a security tool — its core product is Docker containers with iptables, Squid proxy, and capability management. An agent that validates the container security posture (base image CVEs, capability grants, seccomp profile completeness, Squid ACL correctness) would directly strengthen the core product. The static
codeql.ymlonly covers TypeScript, not shell scripts or container configs.How: Weekly schedule. Use bash with
docker inspect, reviewseccomp-profile.json, cross-reference capability grants insetup-iptables.shandentrypoint.sh, check for recently disclosed CVEs in Ubuntu base images. Post findings as a discussion.Effort: Medium — requires domain expertise in container security (which the repo's existing context provides amply via AGENTS.md).
🗂️ Issue Arborist
What: A workflow that periodically links related issues as sub-issues, building hierarchical issue trees automatically.
Why: The Pelis Factory's Issue Arborist created 77 discussion reports and 18 parent issues for grouping. As this repo grows its issue backlog, organizing related security issues, feature requests, and test coverage gaps into parent/child hierarchies would make the backlog far more navigable.
How: Weekly schedule. Analyze open issues using embeddings or keyword similarity. When issues share a common theme (e.g., "iptables filtering", "API proxy", "DNS exfiltration"), create a parent tracking issue and link related issues as sub-issues.
Effort: Medium.
P2 — Consider for Roadmap
♻️ Daily Code Simplification Agent
What: A daily agent that identifies overly complex code patterns and proposes simplifications via PRs — focusing on the TypeScript codebase (
src/).Why: The Pelis Factory's Continuous Simplicity workflow contributed 26 merged PRs out of 30 proposed (86% merge rate). Security-critical code especially benefits from simplicity: simpler code is easier to audit. Complex conditional chains in
src/docker-manager.ts(1000+ lines) could be targeted.Effort: Medium — well-established Pelis pattern. Risk: security-sensitive code needs careful review.
📈 Agentic Portfolio Analyst
What: A weekly workflow that analyzes the portfolio of agentic workflow runs — identifying cost per workflow, token usage trends, merge rates, and suggesting which workflows to tune or retire.
Why: As workflow count grows from 16 to 20+ (which this report will likely trigger), cost visibility becomes important. The Pelis Factory's Portfolio Analyst found workflows "costing money unnecessarily because some agents were too chatty."
Effort: Low-Medium — uses the
agentic-workflowstool for data, outputs a markdown discussion.🔁 PR Auto-Update (Mergefest-style)
What: A workflow that automatically merges
maininto open PRs when they fall behind, preventing stale PR conflicts.Why: As agentic workflows generate more PRs (doc-maintainer, test-coverage-improver, dependency-security-monitor), keeping those PRs up to date manually becomes friction. Mergefest in the Pelis Factory handles this automatically.
Effort: Low — simple orchestration pattern.
P3 — Future Ideas
📚 Glossary Maintainer
A workflow that maintains a consistent security glossary — ensuring terms like "egress filtering", "transparent proxy", "iptables DNAT" are used consistently across docs, AGENTS.md, and CLAUDE.md. The Pelis Factory's Glossary Maintainer achieved 100% PR merge rate (10/10).
📊 Weekly Repository Chronicle
A weekly narrative summary of what changed in the codebase, what agentic workflows ran, and what progress was made. Useful for async teams and for keeping the AI agents' context current.
🤖 PR Nitpick Reviewer
A general code quality reviewer (separate from Security Guard) that checks for non-security issues: TypeScript anti-patterns, missing error handling, test coverage in PRs. The Pelis Factory's Grumpy Reviewer and PR Nitpick Reviewer fill this role.
🔗 Sub-Issue Closer
Automatically close sub-issues when all their children are resolved. Pairs naturally with the Issue Arborist and plan slash command.
📈 Maturity Assessment
Overall Current Level: 3.5 / 5 — "Active Automation" (multiple specialized agents, strong security focus, but gaps in issue pipeline and meta-observability)
Target Level: 4.5 / 5 — "Factory Mode" (complete issue automation pipeline, meta-agents monitoring agents, continuous code quality, full observability)
To get there: Implement the two P0 recommendations (triage + health manager) and the two P1 recommendations (breaking change checker + container audit). That alone would bring the repo to ~4.5/5.
🔄 Comparison with Best Practices
✅ What This Repo Does Well
issue-duplication-detectorcorrectly uses cache-memory for cross-run persistence — a best practice🎯 Unique Opportunities Given This Domain
This repo builds a firewall — which means it can dogfood its own security tools. An agentic workflow that runs AWF itself to validate firewall behavior (testing domain blocking, credential isolation, iptables rules) from a user's perspective would be uniquely valuable. The smoke tests do some of this, but an agent-driven integration test reporter that interprets those smoke test results and creates actionable issues would close the loop.
This report was generated by the Pelis Agent Factory Advisor workflow on 2026-03-22. Analysis was based on crawling the Pelis Agent Factory documentation, exploring the githubnext/agentics reference repository, and analyzing all 16 agentic workflow files in
.github/workflows/. Notes saved to/tmp/gh-aw/cache-memory/pelis-advisor-notes.jsonfor future runs.Beta Was this translation helpful? Give feedback.
All reactions