[Pelis Agent Factory Advisor] Pelis Agent Factory Advisor - Agentic Workflow Maturity Report (2026-03-09) #1180
Replies: 1 comment
-
|
🔮 The ancient spirits stir, and the oracle bears witness: the smoke-test agent has passed through these halls and left its mark.
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
📊 Executive Summary
The
gh-aw-firewallrepository has a strong and growing agentic workflow foundation (28 workflow.mdfiles, 16+ distinct automations) with excellent coverage of security, CI health, and code quality domains — appropriate for a security-critical firewall product. However, several high-value workflow categories from the Pelis Agent Factory remain unexplored: issue triage/labeling, code simplification, meta-agent observability, and PR assistance workflows. Additionally, a cluster of recent Secret Digger failures (#1172, #1171, #1168) and a CI Doctor failure (#1164) suggest some workflows need attention.🎓 Patterns Learned from Pelis Agent Factory
The Pelis Agent Factory blog series documents 100+ automated agentic workflows across 13 categories. The key patterns and best practices that stand out:
Key Patterns from the Factory
How This Repo Compares
What it does well compared to Pelis patterns:
Gaps vs Pelis patterns:
📋 Current Agentic Workflow Inventory
build-test-{bun,cpp,deno,dotnet,go,java,node,rust}workflow_dispatch, scheduleci-doctorworkflow_run(completed)ci-cd-gaps-assessmentcli-flag-consistency-checkerdependency-security-monitordoc-maintainerskip-if-matchissue-duplication-detectorissues.openedissue-monsterissues.opened, hourlypelis-agent-factory-advisorplanissue_commentsecret-digger-{claude,codex,copilot}security-guardpull_requestsecurity-reviewsmoke-{chroot,claude,codex,copilot}test-coverage-improverupdate-release-notesrelease.published🚀 Actionable Recommendations
P0 — Implement Immediately
P0.1: Fix the Secret Digger Cluster Failure
What: Three secret digger workflows (claude, codex, copilot) all recently failed (#1172, #1171, #1168). This is a critical security automation gap.
Why: Secret scanning is a core security practice and having all three engines fail simultaneously suggests a systemic issue (likely a common dependency, API change, or configuration problem). Every day these are broken, potential credentials could go undetected.
How: Investigate the failures in those three issues, identify the common root cause, and fix the shared configuration. The CI Doctor should have caught this, but it itself also failed (#1164) — so check both.
Effort: Low (diagnostic + targeted fix)
P0.2: Add Issue Triage / Labeling Workflow
What: An automated agent that labels new issues with
bug,feature,enhancement,documentation,question,help-wanted, orgood-first-issueand leaves a comment explaining the label.Why: The current open issues have inconsistent labeling (e.g., #1139 "[Security Review]" discussion has no labels, #1136 has no labels). Issue Monster relies on unlabeled issues to find work — but without triage labels, it can't prioritize. In Pelis Factory, this is the "hello world" of agentic workflows and the foundation of the causal chain.
How: Add an issue triage workflow triggered on
issues.opened:Effort: Low (10 min to implement, following the Pelis pattern exactly)
P1 — Plan for Near-Term
P1.1: Breaking Change Checker
What: A workflow triggered on PRs that analyzes changes for backward-incompatible API or CLI flag changes, configuration format changes, or Docker image interface changes, and creates an alert issue or comment.
Why: This firewall is used by CI/CD pipelines. Breaking changes to CLI flags, Docker configurations, or network rules can silently break downstream users. The Pelis Factory's Breaking Change Checker caught issues before they hit production.
How: PR-triggered workflow that examines
src/cli.ts,src/types.ts, and container entrypoints for interface changes. Add as a PR check (safe-outputs:add-comment).Effort: Low-Medium (adapt from Pelis Factory pattern)
P1.2: Workflow Audit / Meta-Agent
What: A weekly or daily workflow that audits all other agentic workflow runs — analyzing costs, error patterns, success rates, and identifying workflows that are failing, expensive, or producing low-quality output.
Why: In the Pelis Factory, the Audit Workflows meta-agent was their "most prolific discussion-creating agent" with 93 reports and 9 issues. Currently this repo has no observability into workflow performance. The cluster of recent failures (Secret Diggers, CI Doctor) would have been caught faster by a meta-agent.
How: Using
tools: agentic-workflows:(already used in security-review), analyze recent workflow run results viaagenticworkflows-logsandagenticworkflows-audit. Create discussions with[Workflow Audit]prefix.Effort: Medium (uses existing
agentic-workflowstool already in the repo)P1.3: Code Simplifier (TypeScript-focused)
What: A daily workflow that analyzes recently modified TypeScript files in
src/and creates PRs with simplifications — shorter code, better idiomatic patterns, extracted helpers for repeated patterns.Why: The Pelis Factory's Code Simplifier achieved an 83% PR merge rate. This TypeScript codebase has patterns that could benefit (e.g., repeated
docker execlogic insrc/docker-manager.tswhich is ~1500 lines). The firewall's security-critical nature makes clean, readable code especially important for security reviews.How: Daily workflow on recently-committed
.tsfiles insrc/, withskip-if-matchto prevent stacked simplification PRs:Effort: Very Low (add-wizard)
P2.5: Firewall-Specific Daily Health Check Discussion
What: A daily discussion summarizing yesterday's firewall usage — which domains were accessed in CI runs, which were blocked, and whether any unexpected domain access patterns appeared.
Why: This is a firewall repository — dog-fooding its own firewall (via smoke tests) should produce observable network access data. A daily summary of
[Firewall Health]showing "10 smoke runs, 0 blocked legitimate domains, 3 blocked unauthorized domains" would demonstrate the product working and catch configuration regressions.How: Post-process squid logs from smoke runs and compile into a discussion. Uses the repo's own
awf logs summarycommand!Effort: Medium (requires log artifact collection across workflow runs)
P3 — Future Ideas
P3.1: Contribution Guidelines Checker
What: Check new PRs against CONTRIBUTING.md rules — conventional commits, test coverage requirements, documentation updates.
How:
gh aw add-wizard githubnext/agentics/contribution-guidelines-checkerP3.2: Glossary Maintainer
What: Keep a technical glossary of AWF-specific terms (Squid, iptables NAT, DNAT, etc.) synchronized with the docs-site.
How:
gh aw add-wizard githubnext/agentics/glossary-maintainerP3.3: Issue Arborist (Sub-issue Linking)
What: Automatically link related issues as sub-issues when they share themes (e.g., all issues about
--allow-domainsflag becoming sub-issues of a parent issue).How: Adapt the Pelis Factory Issue Arborist for this repo's issue taxonomy.
P3.4: Changeset / Release Automation
What: Automate version bump determination and CHANGELOG generation based on commit analysis (semver: feat→minor, fix→patch, breaking→major).
Why: The current
update-release-notesruns after a release is published, but a changeset workflow would prepare releases by auto-generating PRs with the appropriate version bump.How:
gh aw add-wizard https://github.com/github/gh-aw/blob/v0.45.5/.github/workflows/changeset.md📈 Maturity Assessment
Current Level: 3.5 / 5 — Established & Domain-Focused
This repository has moved well beyond basic CI/CD. It has specialized agentic workflows for security review, CI investigation, dependency monitoring, documentation maintenance, and test coverage improvement. The domain-specific adaptations (8 language build-tests, secret-digger variants) show sophisticated application of agentic patterns.
Target Level: 4.5 / 5 — Comprehensive Ecosystem
Gap Analysis to reach 4.5:
🔄 Comparison with Pelis Factory Best Practices
What this repo does particularly well:
Unique opportunities given the domain:
Report generated by Pelis Agent Factory Advisor (2026-03-09). Previous report: #1136 (2026-03-03). Cache memory updated at
/tmp/gh-aw/cache-memory/advisor-notes.md.Beta Was this translation helpful? Give feedback.
All reactions