[Pelis Agent Factory Advisor] Pelis Agent Factory Advisor: Agentic Workflow Maturity Report (2026-03-27) #1473
Closed
Replies: 1 comment
-
|
This discussion was automatically closed because it expired on 2026-04-03T03:39:31.070Z.
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
📊 Executive Summary
gh-aw-firewallis running 22 compiled agentic workflows — an exceptionally mature collection that rivals Peli's Agent Factory in several key categories. Security automation is a particular strength, with multi-engine red-teaming, daily security reviews, and dependency monitoring already in place. The primary gaps are meta-level observability (no workflow-monitoring-the-workflows agent), code quality automation (no continuous simplifier), and a few domain-specific opportunities unique to a security/firewall tool.🎓 Patterns Learned from Pelis Agent Factory
From the Documentation Site
The key patterns in the factory, in rough order of leverage:
From the Agentics Reference Repository
daily-test-improverpattern: incremental test coverage additions via daily PRsshared/)cache-memoryfor persistent cross-run state (already in use here)Comparison to Current Implementation
This repo already matches or exceeds Pelis patterns in security automation. The gap is primarily in meta-observability and code quality automation.
📋 Current Agentic Workflow Inventory
build-testci-doctorworkflow_runfailureci-cd-gaps-assessmentcli-flag-consistency-checkerdependency-security-monitordoc-maintainerfirewall-issue-dispatcherissue-duplication-detectorissue-monsterplansecret-digger-claude/codex/copilotsecurity-guardsecurity-reviewsmoke-claude/codex/copilot/chroottest-coverage-improverupdate-release-notespelis-agent-factory-advisor🚀 Actionable Recommendations
P0 — Implement Immediately
P0.1: Firewall Escape Summary Report
What: A daily aggregation workflow that reads the last 24h of
secret-digger-claude,secret-digger-codex, andsecret-digger-copilotruns and produces a single consolidated "Escape Attempt Report" discussion, tracking which escape vectors were tried, which succeeded, and trends over time.Why: Three red-team agents run hourly across three engines, generating enormous signal. Currently there is no aggregation layer — each run produces individual findings but there's no consolidated view of "what was discovered this week" or "which engine found things the others missed." This is a high-value signal that is currently being lost.
How: New workflow
firewall-escape-report.mdtriggered daily, usingagentic-workflowstool to fetch logs from the threesecret-digger-*workflows, then producing a structured markdown discussion with findings grouped by severity, engine, and attack vector.Effort: Low (uses existing
agentic-workflowstool pattern already seen insecurity-review.md)P0.2: Issue Triage Agent
What: Automatically label and respond to new issues with appropriate labels (
bug,feature,security,documentation,question,help-wanted,good-first-issue), providing a brief comment explaining the label and next steps.Why: The
issue-monsterassigns issues to Copilot but doesn't triage them.issue-duplication-detectordetects duplicates but doesn't label. New issues currently arrive unlabeled unless a human manually triages them. This creates friction for contributors and makes filtering issues impossible.How: New
issue-triage.mdtriggering onissues: [opened, reopened], using GitHub issues toolset to analyze content, apply labels, and leave a brief orienting comment. For a security/firewall tool, special attention tosecuritylabel detection.Effort: Low (standard pattern from Pelis factory with direct
gh aw add-wizardtemplate)P1 — Plan for Near-Term
P1.1: Audit Workflows Meta-Agent
What: A meta-agent that runs daily and audits the runs of all 22 agentic workflows — checking success rates, error patterns, cost/token trends, and identifying workflows that are failing silently or producing low-quality outputs.
Why: With 22 workflows running continuously, the team needs observability into the agent ecosystem itself. The Pelis factory's Audit Workflows meta-agent created 93 discussions and 9 actionable issues — it became the "central nervous system" of their factory. This repo is at the stage where meta-observability becomes critical.
How: New
audit-workflows.mdtriggering daily, using theagentic-workflowstool (which already exists insecurity-review.mdandci-cd-gaps-assessment.md) to download logs, analyze run patterns, detect failures, and post a discussion.Effort: Medium (requires careful prompt engineering to stay within token limits with 22 workflows)
P1.2: Breaking Change Checker
What: A workflow triggered on PRs that identifies changes which could break the public API/CLI interface — new required flags, removed options, changed behavior, Docker image changes, or container API changes.
Why: AWF has users (GitHub Actions workflows) depending on its CLI interface and container images. A breaking change in a security tool that doesn't announce itself is dangerous. The current
security-guardfocuses on security posture, not backward compatibility. The Pelis factory's Breaking Change Checker had 100% actionable issue rate.How: New
breaking-change-checker.mdon PR open/sync, analyzing diffs insrc/cli.ts,src/types.ts, and containerentrypoint.shfor backward-incompatible changes. Creates an alert issue when detected.Effort: Medium
P1.3: Container Image CVE Scanner
What: A daily workflow that scans the three AWF container images (
squid,agent,api-proxy) for known CVEs using tools like Trivy or Grype, creates issues for HIGH/CRITICAL findings, and proposes base image updates.Why: The containers are the core security surface of AWF. Base images (
ubuntu/squid:latest,ubuntu:22.04) accumulate CVEs over time. Thedependency-security-monitorcovers npm dependencies but not container image vulnerabilities. This is a critical blind spot for a security-critical tool.How: Traditional GitHub Actions workflow (
.yml) or new agentic workflow triggering daily, using Trivy/Grype CLI in bash, withsafe-outputs: create-issuefor HIGH/CRITICAL findings.Effort: Medium (requires container tooling setup but pattern is well-established)
P1.4: Fix
ci-doctorHardcoded Workflow ListWhat: The
ci-doctor.mdhas a hardcoded list of ~26 workflow names in theworkflow_run.workflowstrigger. When new workflows are added, this list must be manually updated, making it fragile.Why: Currently when a new workflow is added (as has clearly been happening frequently), it's easy to forget to add it to
ci-doctor's monitoring list. The workflow currently doesn't monitor several recently-added workflows.How: GitHub Actions doesn't support wildcards in
workflow_run.workflows, but two mitigations exist:.github/workflows/*.ymlcount > ci-doctor monitored countagentic-workflowstool toci-doctorso it can also proactively check recent failed runs of workflows not in its trigger listEffort: Low
P2 — Consider for Roadmap
P2.1: Code Simplifier
What: A daily agent that analyzes recently modified TypeScript files, identifies complexity (deeply nested conditionals, repeated patterns, verbose error handling), and proposes PRs with simplifications.
Why: The TypeScript codebase (
src/) has grown significantly. Rapid development leads to accretive complexity. The Pelis factory's Code Simplifier had an 83% merge rate. For a security tool, simpler code is also more auditable code.How: New
code-simplifier.mdtriggered daily, using bash tool to find files changed in the last 3 days, analyzing for TypeScript-specific simplification opportunities (array methods, early returns, type narrowing), creating draft PRs.Effort: Medium
P2.2: Changeset / Auto-Versioning Agent
What: An agent that, after merges to
main, analyzes the accumulated commits since the last release tag, determines the appropriate semver bump (patch/minor/major based on commit types), and proposes a PR updatingCHANGELOG.mdandpackage.jsonversion.Why: The
update-release-notesworkflow runs on release publish, but there's no agent that proactively suggests when to cut a release or prepares the changelog. The Pelis factory's Changeset workflow had a 78% merge rate and significantly reduced release friction.How: New
changeset.mdrunning weekly or on-demand, using git commands to analyze commits since last tag, proposing a changelog PR.Effort: Medium
P2.3: Portfolio Analyst
What: A weekly agent that analyzes the cost and token usage across all agentic workflows, identifies which workflows are expensive relative to their output quality, and proposes optimizations (shorter prompts, smaller models, reduced frequency).
Why: Running 22 workflows continuously (including 3 hourly red-team agents!) has real token cost implications. The Pelis factory's Portfolio Analyst identified "overly chatty" agents costing money unnecessarily. With the repo running 3 × hourly secret-diggers, cost awareness is important.
How: New
portfolio-analyst.mdrunning weekly, using theagentic-workflowstool to pull logs and metrics, generating a cost analysis discussion.Effort: Medium
P2.4: Issue Arborist
What: An agent that periodically analyzes open issues to identify clusters of related issues, links them as sub-issues under a parent, and creates parent "tracking issues" for theme-related work.
Why: As issue volume grows from the various automated triage and dispatcher agents, the issue tracker can become cluttered without hierarchical organization. The Pelis factory's Issue Arborist created 18 parent issues and 77 organization reports.
How: New
issue-arborist.mdrunning weekly, using GitHub issues search to cluster related open issues, creating parent issues for groups.Effort: Medium
P3 — Future Ideas
P3.1: Mergefest (Auto-merge Main into PRs)
What: A workflow that automatically merges the
mainbranch into open, non-draft PRs to keep them current, triggered by pushes tomain.Why: Long-lived PRs (like smoke tests or doc improvements) frequently go stale. Manual rebasing is ceremony. The Pelis factory's Mergefest was an orchestrator workflow that eliminated the "please merge main" dance.
Effort: Low (but requires
contents: writepermission on PRs)P3.2: Daily Malicious Code Scan
What: A daily agent that reviews code changes from the past 24h for suspicious patterns — unexpected network calls, obfuscated code, unusual capability escalations, or supply chain attack patterns.
Why: AWF processes user-supplied commands and runs agent code. A malicious contribution could compromise the firewall. The Pelis factory's Daily Malicious Code Scan added a defense layer against supply chain attacks.
Effort: Low-Medium
P3.3: Schema Consistency Checker
What: A weekly agent that checks for drift between TypeScript types in
src/types.ts, CLI flags insrc/cli.ts, Docker Compose configuration insrc/docker-manager.ts, and their documentation counterparts.Why: The TypeScript types, CLI help text, and documentation all describe the same configuration surface. When one drifts from another, users get confusing errors. The Pelis factory's Schema Consistency Checker created 55 analysis discussions catching drift that would have taken days to notice manually.
Effort: Medium
📈 Maturity Assessment
Current Level: 4/5 (Advanced)
The repository has a notably advanced agentic workflow collection, especially for a project of its size. The security automation (multi-engine red team, three smoke test engines, daily security review) is genuinely best-in-class and goes beyond what Pelis documented.
Target Level: 5/5 (Factory-Grade)
Gap to Close: The main gap is meta-observability — the repository doesn't have an agent watching all the agents. With 22 workflows now running, this becomes increasingly important for operational hygiene.
🔄 Comparison with Best Practices
What this repository does exceptionally well
firewall-issue-dispatcher(bidirectional withgithub/gh-aw) is a sophisticated patternshared/directory withmcp-pagination.md,secret-audit.md,version-reporting.md,gh.mdis textbook Pelis factory patternWhat could improve
Unique opportunities given the domain
📝 Notes for Future Runs
Stored in
/tmp/gh-aw/cache-memory/notes.txt. Key items to track over time:ci-doctor's hardcoded workflow list gets updated as new workflows are addedBeta Was this translation helpful? Give feedback.
All reactions