Agent Persona Exploration - 2026-03-31 #23631
Closed
Replies: 2 comments
-
|
[deleted by mistake — please ignore] |
Beta Was this translation helpful? Give feedback.
0 replies
-
|
This discussion has been marked as outdated by Agent Persona Explorer. A newer discussion is available at Discussion #23815. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Persona Overview
developer.instructions(agentic-workflows custom agent)Key Findings
strict: true, minimal permissions, and safe-outputs write separation appeared in every responsepull-requests: writedirectly on the agent job, while the more secure pattern (read-only agent job, write delegated entirely to safe-outputs) appeared in the other 5Top Patterns
pull_requestwithpaths:filter +concurrency.cancel-in-progress: true(5/7 scenarios)githubMCP toolsets always present;bashwith explicit command allowlist (6/7); engine-specific:playwrightMCP (visual regression),agentic-workflowsMCP audit tool (deployment failures)strict: truein 100% of responses; network allowlist always scoped to minimum needed; safe-outputs used as the sole write path;noopdeclared as mandatory exit in every scenarioView High Quality Responses (Top 3)
do-1— DevOps Deployment Failure Analyzer (5.0/5)Standout: Used the
agentic-workflowsMCPaudittool itself for structured log analysis, showing meta-awareness of the ecosystem. Included dedup check for existing incidents,close-older-issues: falsefor audit history,expires: 30dfor cleanup, and a production hardening table with Slack, oncall assignment, and repo-memory enhancements.qa-2— QA Bug Triage (5.0/5)Standout: Only scenario to use
add-labelssafe-output with an explicitallowed:list — preventing the agent from polluting the label namespace. Also includedrate-limit: max: 3 / window: 60to prevent API flooding on bulk issue imports. Guard condition for already-triaged issues (existingseverity/*label → noop).be-1— Backend DB Schema Review (5.0/5)Standout: Most explicit about the permission model —
pull-requests: readon the agent job with a comment explicitly noting the framework injects write access for safe-outputs separately. Step-by-step SQL severity classification table (CRITICAL/HIGH/MEDIUM/INFO) with specific patterns likeADD COLUMN ... NOT NULLwithout DEFAULT.View Areas for Improvement
Inconsistent permission model for PR-automation workflows
fe-1(visual regression) andqa-1(coverage analysis) specifiedpull-requests: writeon the agent jobbe-1,be-2,qa-2,do-1,pm-1correctly used read-only agent permissions, delegating writes entirely to safe-outputsbe-2adds Go module proxy to network allowlistoasdiffviago install, the response addedproxy.golang.organdsum.golang.orgto the network allowlistRecommendations
Clarify the PR-automation permission model in
.github/aw/create-agentic-workflow.md: document whetherpull-requests: writebelongs on the agent job or should be entirely delegated to safe-outputs. The inconsistency across 7 responses suggests the documentation is ambiguous on this point.Promote the
add-labelsallowlist pattern in workflow examples — it's the only safe way to let an agent apply labels without risking namespace pollution, but it only appeared in 1/7 scenarios (the bug triage case where it was obviously needed).Add a
rate-limitusage example to the documentation for issue-triggered workflows — therate-limit: max: 3 / window: 60pattern fromqa-2elegantly prevents API flooding on bulk operations but is easy to miss if not shown in an example.References:
Beta Was this translation helpful? Give feedback.
All reactions