Daily Audit Report – 2026-03-22 #22237
Closed
Replies: 2 comments 1 reply
-
|
/plan |
Beta Was this translation helpful? Give feedback.
1 reply
-
|
This discussion has been marked as outdated by Agentic Workflow Audit Agent. A newer discussion is available at Discussion #22383. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Audit covering the last 24 hours of agentic workflow runs in github/gh-aw.
Summary
Workflow Health Trend
Only data from today's 24-hour window is available (no prior history in cache). Success rate is 82.1% with 5 failures.
Token & Cost Trend
Token-level metrics are not yet available per run (stored as 0). Cost tracking is not active in the current harness version.
❌ Failed Runs
5 failed workflows
Notes:
Smoke Update Cross-Repo PRandSmoke Multi PRboth failed at thesafe_outputsjob — possible safe-output processing issue.GitHub Remote MCP Authentication Testfailed with MCP tools unavailable: GitHub MCP toolsets not loaded in runner (remote mode inaccessible).jsweepfailed at the agent job — firewall blocked 33 requests including 29 toproxy.golang.orgwhich may be required.Smoke Codexhas 1/4 runs failing (25%) — intermittent codex agent failure pattern.2 missing tool reports
1.
push_repo_memory— PR Triage Agent (§23391811735)push_repo_memoryfalse-positive size error (actual files: ~560 bytes, reported size: 29 KB). This is a systemic bug in thepush_repo_memorytool — it appears to measure something other than working tree file sizes.2.
GitHub MCP tools (list_issues, get_repository)— GitHub Remote MCP Authentication Test (§23396245004)This workflow is testing remote MCP authentication and failed because toolsets were not loaded — this is expected behavior under test failure conditions.
🔥 Firewall Activity
Notable blocked domains
ab.chatgpt.com:443ab.chatgpt.com:443ab.chatgpt.com:443proxy.golang.org:443invalid.example.invalid:443storage.googleapis.com:443ab.chatgpt.comblocks are consistently benign (Codex telemetry/analytics). Theproxy.golang.orgblocks forjsweepmay be contributing to its failure — if the agent needs to fetch Go modules, the firewall configuration needs to permit this domain.🚩 Recommendations
push_repo_memorysize reporting bug — both PR Triage Agent and this audit encountered false-positive size limits. Actual files are ~560 bytes but the tool reports 29–30 KB. Likely measuring git object store or pack size rather than working tree.proxy.golang.orgtojsweepfirewall allowlist — 29 blocked requests to this domain correlate with the agent failure. This is needed to fetch Go dependencies.Smoke Update Cross-Repo PRandSmoke Multi PRsafe_outputs failures — two smoke tests failed at the safe_outputs stage. Check if a safe-output processing regression was introduced recently.Smoke Codexreliability — 1/4 runs failing (25%) over this period. If the pattern persists, investigate Codex agent stability.By Engine
Codex has the lowest success rate (66.7%) this period, partially explained by
Smoke Codexintermittent failures andjsweepfirewall issues.References:
Beta Was this translation helpful? Give feedback.
All reactions