[Pelis Agent Factory Advisor] Pelis Agent Factory Advisor: Workflow Maturity Assessment (2026-03-26) #1444
Closed
Replies: 1 comment
-
|
This discussion was automatically closed because it expired on 2026-04-02T03:37:36.678Z.
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
📊 Executive Summary
This repository is in the top tier of agentic workflow adoption, with 21 compiled agentic workflows already deployed across security, CI, documentation, and issue management. The standout strength is exceptional security coverage—three parallel secret-digger red-team agents, a PR security guard, daily deep security reviews, and dependency monitoring. The primary gap is a missing issue triage agent for auto-labeling, and no daily static analysis reports (zizmor/poutine/actionlint)—surprising for a security-focused tool that already uses these in its compile pipeline.
🎓 Patterns Learned from Pelis Agent Factory
Key Patterns from Documentation Site
The Pelis Agent Factory ran 100+ workflows in the
github/gh-awrepository, exploring the philosophy of "let's create a new automated agentic workflow for that" for nearly every opportunity.Top patterns observed:
/commandsecret-digger-{claude,codex,copilot}pattern already in this repoKey Patterns from Agentics Repository (githubnext/agentics)
The agentics reference repository has these relevant patterns not yet in this repo:
daily-test-improver.md- Identifies coverage gaps and writes testsci-coach.md- Analyzes CI pipelines for optimization opportunitiesissue-arborist.md- Links related issues as sub-issues (77 discussion reports, 18 parent issues)grumpy-reviewer.md- Opinionated code reviewer with personalityq.md- On-demand workflow optimizer via slash commandsub-issue-closer.md- Auto-closes completed sub-issuesComparison to This Repository
This repo has internalized the security specialization pattern exceptionally well (3 secret diggers, separate security guard + security review + dependency monitor). However, it is under-indexed on continuous code quality and meta-monitoring patterns.
📋 Current Agentic Workflow Inventory
build-testci-cd-gaps-assessmentci-doctorcli-flag-consistency-checkerdependency-security-monitordoc-maintainerissue-duplication-detectorissue-monsterpelis-agent-factory-advisorplan/planslash commandsecret-digger-claudesecret-digger-codexsecret-digger-copilotsecurity-guardsecurity-reviewsmoke-chrootsmoke-claudesmoke-codexsmoke-copilottest-coverage-improverupdate-release-notes🚀 Actionable Recommendations
P0 - Implement Immediately
[P0] Issue Triage Agent
What: Automatically label new issues with
bug,feature,enhancement,documentation,question, orsecuritybased on content analysis. Comment on the issue explaining the label and hinting at next steps.Why: This is the "hello world" of agentic workflows in Pelis. Every issue currently lands unlabeled unless a human reviews it. The
issue-monsterthen has to pick up unlabeled issues without knowing their nature. Adding auto-labeling creates a natural pipeline: triage → issue-monster → Copilot SWE agent.How: Simple workflow triggered on
issues: [opened, reopened]withadd-labelsandadd-commentsafe outputs. High priority forsecuritylabel given the domain.Effort: Low (30 min to write, already have the safe-output tools)
[P0] Daily Static Analysis Report
What: Daily workflow running
zizmor,poutine, andactionlinton the compiled lock files and workflows, posting results as a discussion.Why: This repo already runs these tools in the CI compile step, but only on changed files. A daily full-repo static analysis would catch security drift in workflow files—especially important since this is a security tool whose own workflows should be above reproach. The Pelis factory ran 57 such discussions, making it one of their most active security workflows.
How: Use
agenticworkflows-compilewith--zizmor --poutine --actionlintflags, analyze results, and post as a[Static Analysis]-prefixed discussion.Effort: Low (the compile tool already has these flags; workflow body is straightforward)
P1 - Plan for Near-Term
[P1] Daily Malicious Code Scan
What: Daily scan of commits from the past 24 hours looking for suspicious patterns: unexpected network endpoints hardcoded, obfuscated strings, unusual base64 blobs, supply chain attack indicators in dependency files.
Why: AWF is a security-critical tool. A sophisticated attacker compromising a PR could insert malicious code designed to phone home or weaken firewall rules. As Pelis notes, "it happens." The repo already runs hourly secret diggers inside the agent container—this would scan the source code itself.
How: Read recent commits via
git log --since 24h, analyze diffs for suspicious patterns using bash + LLM reasoning. Post findings as issues tagged[Malicious Code Scan].Effort: Low-Medium
[P1] Changeset / Version Bump Automation
What: When a PR is merged to main with
feat:orfix:commits (conventional commits are enforced), automatically open a draft PR that bumps the version inpackage.jsonand updatesCHANGELOG.md.Why: The repo has
update-release-notes(post-publish) but nothing pre-release. The Pelis Changeset workflow had 78% merge rate (22/28 PRs). This repo enforces conventional commits viacommitlint—perfect input signal.How: Triggered on
push: [main], analyzes commits since last tag withgit log, determinesmajor/minor/patchbump, updatespackage.jsonand changelog, opens draft PR with[chore] bump versionprefix.Effort: Medium
[P1] Breaking Change Checker
What: PR-triggered agent that analyzes changes to CLI flags (
src/cli.ts), Docker API (src/docker-manager.ts), and public TypeScript interfaces (src/types.ts) to detect backward-incompatible changes and alert maintainers.Why: AWF is used by CI pipelines and scripts that depend on stable CLI flags and container behavior. Unannounced breaking changes are high-risk. The Pelis Breaking Change Checker creates alert issues (e.g., #14113).
How: On PR open/sync, diff
src/cli.tsandsrc/types.tsagainst main. Look for removed/renamed flags, changed default values, altered container networking parameters. Create an issue if breaking changes detected.Effort: Medium
P2 - Consider for Roadmap
[P2] Workflow Health Manager
What: A weekly meta-agent that reviews the health of all other agentic workflows: checks for workflows that haven't run recently, identifies ones with high failure rates, spots outdated dependencies in workflow configs.
Why: With 21 workflows, some inevitably go stale, have broken triggers, or drift from the codebase. The Pelis Workflow Health Manager created 40 issues and had 25 lead to 34 PRs. This repo's
ci-doctorhandles individual failures but not systemic health.How: Use
agenticworkflows-statusandagenticworkflows-logsto get run history. Flag workflows that haven't run in 7+ days (possible broken trigger), have >50% failure rate, or aren't in theci-doctorwatchlist.Effort: Medium
[P2] Code Simplifier
What: Daily agent that looks at recently modified TypeScript files (
src/*.ts) and proposes simplifications: extracting repeated patterns, simplifying nested conditionals, consolidating error handling.Why: AWF is a complex codebase with Docker orchestration, iptables rules, and Squid config generation. Complexity accumulates. The Pelis Code Simplifier had 83% merge rate (5/6 PRs). Given the security-critical nature, simpler code is also safer code.
How:
git diff --name-only HEAD~5 HEADto find recently changed files, analyze with LLM, propose simplifications via draft PR. Skip test files and lock files.Effort: Low-Medium
[P2] Issue Arborist
What: Weekly agent that scans open issues and groups related ones (e.g., multiple issues about DNS exfiltration, or several about IPv6 handling) by creating a parent issue and linking children as sub-issues.
Why: As AWF grows, related issues accumulate without structural organization. The Pelis Issue Arborist created 18 parent issues to group related work. Given that AWF has
issue-monsterdispatching issues to Copilot SWE, organized sub-issues would give it better batched context.Effort: Medium
[P2] Grumpy Reviewer / Q Optimizer
What:
/grumpyslash command on a PR—performs opinionated code review with a sharp eye for security regressions specific to AWF (iptables rule order, Squid ACL bypass, capability dropping completeness)./qslash command—investigates workflow issues and proposes fixes.Why: Security Guard already reviews all PRs for security. Grumpy Reviewer would add a general code quality layer with domain expertise, invoked on-demand. Q would give maintainers an interactive way to debug workflow problems.
Effort: Medium each
P3 - Future Ideas
[P3] Weekly Issue Summary
What: Weekly digest posted as a discussion summarizing open issues by category, newly closed issues, and flagging issues that have been stale for 30+ days.
Why: Community visibility and maintainer awareness. Low immediate impact but good hygiene.
[P3] Daily Performance Monitor Enhancement
What: The existing
performance-monitor.yml(non-agentic) could be complemented with an LLM-powered agent that interprets benchmark regressions and proposes fixes.Why: Converts raw timing data into actionable insights.
[P3] Agentic Wiki / Contribution Guide Agent
What: An agent (from
githubnext/agentics/agentic-wiki-coder.mdpattern) that maintains a livingCONTRIBUTING.mdbased on actual recent PR activity—updating it when new patterns emerge (e.g., when a new container was added, when the AWF--build-localflag pattern appeared).Why: CONTRIBUTING.md tends to go stale quickly in active projects.
📈 Maturity Assessment
Overall Current Level: 4/5 — Highly mature, especially for a security tool. Among the top 10% of repositories in agentic workflow adoption.
Target Level: 4.5/5 — Achievable by implementing the P0 and P1 recommendations above.
Gap to Close: Issue triage, static analysis reports, malicious code scan, and changeset automation would fill the most significant gaps with relatively low effort.
🔄 Comparison with Best Practices
What This Repository Does Exceptionally Well
What Could Improve
Unique Opportunities Given the Domain
This repository's domain (firewall/security for AI agents) creates unique automation opportunities not seen in the Pelis factory:
📝 Notes for Future Runs
Run date: 2026-03-26 | 21 agentic workflows found | First run (no prior state)
Items to track over time:
Beta Was this translation helpful? Give feedback.
All reactions