[Pelis Agent Factory Advisor] Agentic Workflow Advisory — April 2026 #1985
Closed
Replies: 1 comment
-
|
This discussion was automatically closed because it expired on 2026-04-22T10:54:04.965Z.
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
📊 Executive Summary
gh-aw-firewallhas one of the most mature agentic workflow estates in the Pelis Agent Factory ecosystem — 37 agentic.mdworkflow files covering security, smoke testing, CI monitoring, documentation, token optimization, and issue management. The repository is an excellent reference for best practices. The top near-term opportunities are: an AWF-specific PR code reviewer that enforces firewall security boundaries, a container image security scanner (critical for a security tool that ships Docker images), and Dependabot PR bundling to reduce dependency-update noise.🎓 Patterns Learned from Pelis Agent Factory
.mdfragments viaimports:shared/gh.md,shared/reporting.md,shared/mcp-pagination.md, etc.issue-duplication-detector,pelis-agent-factory-advisorworkflow_run📋 Workflow Inventory
smoke-claudesmoke-copilotsmoke-codexsmoke-opencodesmoke-chrootsmoke-services--allow-host-service-ports(Redis/PG)build-testsecurity-guardsecurity-reviewsecret-digger-claudesecret-digger-codexsecret-digger-copilotdependency-security-monitorci-doctorworkflow_runfailedci-cd-gaps-assessmentissue-monsterissue-duplication-detectorfirewall-issue-dispatchergh-aw→gh-aw-firewallissue syncdoc-maintainertest-coverage-improvercli-flag-consistency-checkerclaude-token-usage-analyzerclaude-token-optimizerworkflow_runchainedcopilot-token-usage-analyzercopilot-token-optimizerworkflow_runchainedupdate-release-notesrelease: publishedplan/planslash command for issue decompositionpelis-agent-factory-advisorshared/gh.mdshared/reporting.mdshared/mcp-pagination.mdshared/secret-audit.mdshared/version-reporting.mdshared/mcp/gh-aw.mdshared/mcp/tavily.md🚀 Recommendations
P0 — High Impact, Low Effort (Implement Now)
1. 🔍 AWF-Specific PR Code Reviewer
What: A PR-triggered agentic reviewer that goes beyond
security-guard's security focus to check code quality, patterns, and AWF conventions.Why:
security-guarddetects security weakening, but doesn't check: correct--allow-domainspatterns in tests, proper iptables rule ordering, Docker Compose health-check patterns, or test structure. This fills the gap.How:
Check for: consistent iptables rule ordering, correct base64 config injection pattern, domain ACL format, test coverage of new features.
Effort: Low — similar to existing
security-guardstructurePelis reference: Grumpy Reviewer / PR Nitpick Reviewer patterns
2. 📦 Dependabot PR Bundler
What: Weekly agent that groups Dependabot PRs (especially patch-level
npmand Docker base image updates) into a single bundled PR.Why: The repo has many dependencies (
package.json+ container base images). Individual Dependabot PRs create review fatigue and thedependency-security-monitoralready identifies safe updates. The bundler closes the loop by creating actionable PRs.How:
Effort: Low — Pelis Agent Factory has a reference implementation
Pelis reference: Dependabot PR Bundler
P1 — High Impact, Medium Effort (Near-Term)
3. 🐳 Container Image Security Scanner
What: Weekly agentic workflow that runs
trivyorgrypeagainst the published GHCR images (ghcr.io/github/gh-aw-firewall/squid,agent,api-proxy) and creates issues for HIGH/CRITICAL CVEs in base images.Why: AWF ships Docker images to GHCR used in production security-sensitive environments. Base images (
ubuntu/squid:latest,ubuntu:22.04) accumulate OS-level CVEs over time. The existingdependency-audit.ymlanddependency-security-monitorcover npm packages — not container OS packages. This is a significant blind spot for a security firewall tool.How:
Effort: Medium — needs Trivy setup step, GHCR pull permissions
Pelis reference: Daily Malicious Code Scan + VEX Generator patterns
4. 📊 Weekly Repository Status Report
What: Weekly digest of repository activity: PRs merged, issues opened/closed, agentic workflow health, token usage trends, top contributors.
Why: The repo has excellent per-topic workflows (CI Doctor, security-review, token analyzers) but no single weekly digest that synthesizes health across all dimensions. Maintainers currently must read multiple sources.
How:
Aggregate: workflow success rates (via
agentic-workflowstool), open issue counts, dependency update backlog, recent CVEs.Effort: Medium — requires aggregating across multiple data sources
Pelis reference: Weekly Issue Summary / Daily Repo Status patterns
5. ✅ Contribution Guidelines Checker
What: PR-triggered agent that verifies contributions comply with
CONTRIBUTING.mdandAGENTS.mdconventions: commit message format, test coverage for new code, documentation updates, correct copyright headers.Why:
CONTRIBUTING.mdandAGENTS.md/CLAUDE.mdare detailed and project-specific. Human reviewers must check these manually today. Thesecurity-guardfocuses on security impact, not compliance.How:
Check: TypeScript types present,
npm run build+npm testwould pass for changed files, docs updated if CLI flags changed, smoke workflow.lock.ymlrecompiled if.mdchanged.Effort: Medium — needs careful prompt engineering to avoid false positives
Pelis reference: Contribution Guidelines Checker
P2 — Medium Impact (Backlog)
6. 🔗 Link Fixer Agent
What: Extend the existing
link-check.yml(which finds broken links) with an agentic workflow that creates PRs to fix them.Why: The
link-check.ymlCI workflow finds broken links but creates no action item — someone must manually fix them. An agent could auto-update URLs or remove dead links.Effort: Low-Medium
Pelis reference: Link Checker (auto-fix variant)
7. 🔍 Duplicate Code Detector
What: Monthly agent that scans
src/for duplicated logic patterns (e.g., repeated Docker Compose generation code, duplicated iptables rule patterns) and creates refactoring issues.Why:
src/docker-manager.tsis large (2000+ lines per CLAUDE.md). Regular duplicate detection prevents entropy accumulation.Effort: Medium
Pelis reference: Duplicate Code Detector
8. ⚡ Agentic Performance Improver
What: Monthly agent that reads
performance-monitor.ymlresults, identifies regressions or slow paths, and creates PRs to optimize hot code paths (e.g., Docker Compose startup time, squid config generation).Why:
performance-monitor.ymlcollects data but creates no action items. Closing the loop with an agent improves the "measure → act" cycle.Effort: Medium
Pelis reference: Daily Perf Improver
9. 🔒 VEX Generator
What: Automated OpenVEX statement generator for dismissed Dependabot alerts, capturing security assessments in machine-readable format.
Why: AWF already has
dependency-security-monitorthat detects vulnerabilities. When alerts are dismissed (e.g., "not applicable in our container context"), generating OpenVEX statements documents the rationale and enables downstream tooling.Effort: Medium
Pelis reference: VEX Generator
P3 — Nice to Have
10. 📅 Release Readiness Agent
What: Weekly agent that analyzes commits since last tag, checks if conventional commit messages suggest a release is warranted, and creates a "release readiness" discussion with suggested version bump and changelog draft.
Why:
update-release-notes.mdtriggers after a release is published. A readiness agent surfaces the release decision — currently a manual judgment call.Effort: Medium-High
11. 🏋️ Daily File Diet
What: Monitor source files that exceed size thresholds (e.g.,
src/docker-manager.ts> 2000 lines) and create tracked refactoring issues.Why: Large files are harder to review, test, and maintain. Early warning prevents growth.
Effort: Low
Pelis reference: Daily File Diet
12. 🔬 Formal Verification Scout
What: Agent that identifies pure functions in
src/squid-config.tsandsrc/host-iptables.tssuitable for property-based testing or formal verification — the security-critical ACL generation logic.Why: AWF's domain-whitelist ACL generation and iptables rule construction are security-critical pure functions. Formal correctness guarantees here would be highly valuable.
Effort: High
Pelis reference: Lean Squad
📈 Maturity Assessment
Overall: 4.0/5 → Target 4.6/5
🔄 Best Practice Comparison
What This Repo Does Exceptionally Well
shared/folder with reusable imports is the right pattern for a large workflow estatefirewall-issue-dispatcherpulling from upstreamgh-awis a sophisticated patternWhat Could Be Improved
security-guardis excellent but narrow; no general quality reviewci-doctorentries — Several newer workflows not yet in CI Doctor's monitored list (e.g.,Pelis Agent Factory Advisor)📝 Notes
Cache update: Hash
c835d85816ba5c913e7457be28bf1b55a5f2f5015298344bf3e8121250b59261observed for Pelis docs. Cache-memory write skipped (permission denied in this run).Priority action items:
Dependabot PR Bundler— lowest effort, clear valuePatterns to carry forward:
workflow_runchaining pattern (analyzer → optimizer) works very well and should be applied to the container security scanner (scan → remediation issue)shared/module pattern should be extended with ashared/container-security.mdfor reusable Trivy scan instructionsskip-if-matchguards are consistently applied — maintain this discipline for all new write workflowsBeta Was this translation helpful? Give feedback.
All reactions