[Pelis Agent Factory Advisor] Pelis Agent Factory Advisor — Workflow Analysis & Recommendations (2026-03-29) #1490
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
📊 Executive Summary
The
gh-aw-firewallrepository demonstrates exceptional agentic workflow maturity — one of the most complete agentic workflow deployments observed in a production repository. With 22 compiled agentic workflows spanning security, testing, documentation, CI/CD, and issue management, it already embodies most Pelis Agent Factory best practices. The primary gaps are a missing issue triage/labeling agent, a meta-audit/observability agent, and a domain-specific allowlist advisor tailored to this tool's unique security focus.🎓 Patterns Learned from Pelis Agent Factory
From the Documentation Site
Key patterns from Peli's Agent Factory (100+ workflows in production):
ci-doctorcli-flag-consistency-checker)/planonly)secret-digger-*(3 engines!)dependency-security-monitorsmoke-*(4 workflows)From the
githubnext/agenticsRepositoryThe agentics repo features:
daily-repo-goals,daily-workflow-sync,import-workflow,link-checker, andmaintainer— all focused on cross-repo workflow management and auto-importing useful workflows. This repo exceeds that level of maturity significantly.Comparison Summary
This repository exceeds the agentics reference implementation in workflow density and specialization. It matches Pelis Factory practices in security automation, CI diagnosis, and multi-engine testing. It falls short on observability of the agent ecosystem itself and issue lifecycle management.
📋 Current Agentic Workflow Inventory
security-guardci-doctordoc-maintainerfirewall-issue-dispatcherdependency-security-monitorcli-flag-consistency-checkerissue-monsterupdate-release-notestest-coverage-improverplan/planslash commandissue-duplication-detectorsecurity-reviewci-cd-gaps-assessmentbuild-testsecret-digger-claude/codex/copilotsmoke-claude/codex/copilot/chrootpelis-agent-factory-advisor🚀 Actionable Recommendations
P0 — Implement Immediately
[P0] Issue Triage Agent
What: Auto-label new issues with categories like
bug,feature,documentation,question,security,performance, and add a welcoming comment explaining the label and pointing to relevant docs.Why: The
issue-monsterhandles assignment but there's no labeling/triage step. Issues arrive unlabeled, making filtering and prioritization harder. In Pelis Factory, the issue triage agent was described as "hello world" — foundational automation that multiplies the value of everything else.How: Trigger on
issues: [opened, reopened]. Read issue content, match against AWF-specific categories (includesecuritylabel for issues about domain bypass, credential exposure, container escape), add label, comment with next steps. Takes ~5 minutes to implement.Effort: Low
Example:
[P0] Add
/fixand/reviewChatOps Slash CommandsWhat: Add slash commands that fire on-demand agents:
/fixto attempt automated fixes for labeled bugs,/reviewto trigger deep security review of a specific PR beyond whatsecurity-guarddoes.Why: The factory's "Q" agent (78% merge rate, 69 merged PRs) shows slash-command-triggered agents are the highest-ROI ChatOps investment. Currently only
/planexists. This is particularly valuable for a security tool where maintainers want on-demand expert analysis.How: Add two new slash-command workflows.
/fixtriggersissue-monsterstyle work on the specific issue./reviewtriggers a deep security analysis similar tosecurity-reviewbut scoped to the specific PR.Effort: Low (reuse patterns from
plan.mdandsecurity-review.md)P1 — Plan for Near-Term
[P1] Audit Workflows (Meta-Agent)
What: A weekly or daily meta-agent that inspects all other agentic workflow runs, analyzes their success/failure rates, token costs, and quality, and posts a discussion with insights. Flags expensive or underperforming workflows.
Why: Pelis Factory's Audit Workflows agent created 93 discussion reports and raised 9 actionable issues. With 22+ workflows running constantly (especially the hourly
secret-digger-*trio), there's real risk of cost accumulation and quality degradation without oversight. Theci-cd-gaps-assessmentis close but focuses on gaps rather than agent performance.How: Use
tools: agentic-workflowsto access run logs. Usetools: cache-memoryto track trends. Emit a weekly[Audit] Agent Ecosystem Healthdiscussion.Effort: Medium
[P1] Breaking Change Checker
What: On every PR, analyze if the change introduces backward-incompatible modifications to the AWF public API: CLI flags being removed/renamed, Docker Compose interface changes, environment variable contract changes, or network topology changes.
Why: AWF has a well-defined public interface (CLI flags, env vars, container IPs). Breaking these silently causes integration failures for users. The CI Doctor can catch build failures, but not semantic breaking changes. Pelis Factory's Breaking Change Checker was described as creating alert issues before changes reach production.
How: Trigger on PR, read
src/cli.tsdiff, compare against documented flags indocs/usage.mdanddocs-site/, flag removals or renames, create issue or PR comment.Effort: Medium
[P1] Container Image Freshness Monitor
What: Weekly agent that checks if the base images (
ubuntu/squid:latest,ubuntu:22.04, Node.js for api-proxy) have known CVEs in their current pinned versions, and proposes updates.Why: This is a security tool. If its own container images have known vulnerabilities (especially privilege escalation or container escape CVEs), it undermines the entire security model.
dependency-security-monitorcovers npm packages but not the Docker base images.How: Use
bashto rundocker scoutor query the GitHub Advisory Database for base image CVEs. Create issues for high/critical findings. ProposeDockerfileupdates.Effort: Medium
[P1] Domain Allowlist Advisor
What: A weekly agent that analyzes real Squid access logs from smoke test runs and CI, identifies patterns of blocked-but-legitimate traffic (e.g., npm CDNs, PyPI mirrors), and suggests allowlist improvements for common agent use cases.
Why: AWF is a firewall tool, and its default domain allowlists directly impact the success rate of agents using it. This is uniquely valuable domain intelligence that no generic factory workflow could provide. Real traffic analysis from the smoke tests (
smoke-*) would surface gaps in the documented allowlist examples.How: Read preserved squid logs from CI artifacts, aggregate blocked domains by frequency, filter out known-malicious ones, generate a
[Allowlist Advisor]discussion with suggestions fordocs/andexamples/.Effort: Medium
P2 — Consider for Roadmap
[P2] Continuous Refactoring Agent
What: Weekly agent that scans
src/for opportunities: functions > 50 lines, duplicate code patterns, TODO/FIXME comments, TypeScriptanyusages, and proposes PRs to address them.Why: The codebase has complex modules (
docker-manager.tsgenerates Docker Compose from 500+ line functions). Pelis Factory's Continuous Refactoring created meaningful code quality improvements automatically.Effort: Medium
[P2] Mergefest — Auto-merge Main into Stale PRs
What: Daily agent that finds PRs that are behind main by more than N commits and merges main into them automatically (or creates a comment requesting it).
Why: Long-lived feature PRs in this repo (firewall logic changes) can drift significantly from main, especially with active CI/CD changes. This reduces the "please merge main" friction.
Effort: Low
[P2] Issue Arborist — Sub-issue Organizer
What: When multiple related issues are filed (e.g., multiple reports of the same Squid config problem), auto-link them as sub-issues under a parent tracking issue.
Why: Pelis Factory's Issue Arborist created 77 discussion reports and 18 parent issues. For a tool used in many organizations, related issues about the same underlying problem can pile up.
Effort: Low-Medium
[P2] Onboarding Checklist Agent
What: When a first-time contributor opens their first PR, post a personalized checklist comment covering AWF-specific requirements: security review considerations, how to run smoke tests locally, the postprocess-smoke-workflows step, etc.
Why: The AGENTS.md and CLAUDE.md files are dense. New contributors frequently miss the post-processing step or don't understand the strict mode compilation requirements. An onboarding comment at PR-open time provides just-in-time education.
Effort: Low
P3 — Future Ideas
[P3] Workflow Generator Slash Command
What: A
/new-workflow (description)slash command that scaffolds a new.mdworkflow file, compiles it, and opens a PR — inspired by Pelis Factory's Workflow Generator.Why: This repo's own workflow generator (if added) could accelerate adding new agentic workflows by generating properly structured templates with correct AWF-specific security settings.
Effort: Medium-High
[P3] Protocol Compliance Validator
What: Monthly deep-dive agent that validates the iptables rules, Squid configuration, and container networking actually match what's documented in
docs/architecture.mdandAGENTS.md. Checks for configuration drift.Why: Security tools suffer from documentation drift — what's written about how the firewall works vs. what the code actually does. This is particularly risky for the Squid ACL generation and iptables setup.
Effort: High
[P3] Performance Regression Agent
What: Extend the existing (non-agentic)
performance-monitor.ymlwith an AI layer that interprets benchmark trends over time and flags regressions with explanations, not just raw numbers.Why: Container startup time directly impacts UX. An agent that says "startup time increased 40% in the last 3 weeks — likely caused by PR #X which added an extra Docker layer" is more actionable than a raw benchmark number.
Effort: Medium
📈 Maturity Assessment
/planslash command; large opportunityCurrent Level: 4/5 — Advanced practitioner. The repository is among the top ~5% of repositories for agentic workflow maturity. The secret-digger trio (3 engines, hourly!) is genuinely novel and impressive.
Target Level: 5/5 — Complete the meta-observability layer (audit workflows), add issue triage, and add 2-3 interactive slash commands.
Gap Analysis: ~3-4 workflows would close the gap to level 5: issue triage, audit meta-agent, and one or two slash commands.
🔄 Comparison with Pelis Agent Factory Best Practices
What This Repo Does Well
issue-duplication-detectorusescache-memorycorrectly for persistence — exactly the pattern recommended by the factoryfirewall-issue-dispatcherbridgesgh-awandgh-aw-firewallissues — a sophisticated cross-repo patternsecurity-review.mdandsecurity-guard.mdinclude deep AWF-specific context about container escape, iptables manipulation, and Squid ACLsWhat Could Be Improved
📝 Notes for Future Runs
Stored in
/tmp/gh-aw/cache-memory/advisor-notes.json:Beta Was this translation helpful? Give feedback.
All reactions