Skip to content

[integrity-audit] Integrity Filtering Audit — github/gh-aw (2026-03-25) #2502

@github-actions

Description

@github-actions

Audit period: Last 24 hours (2026-03-24T10:42Z – 2026-03-25T10:42Z)
Runs analyzed: 90 completed workflow runs in github/gh-aw
Runs with DIFC pipeline (scheduled agentic workflows): 30
Runs with artifacts inspected: 7 (artifact download blocked for remaining due to DIFC secret-scope policy)


Findings Summary

Severity Count Description
🔴 Critical 0 No data leaks, guard bypasses, or labeling failures detected
🟡 Warning 2 Detection failures causing skipped safe_outputs (8 runs); DIFC audit log access restricted
🟢 Info 3 Normal DIFC filtering active; action_required runs pending; push CI runs not in DIFC scope

🟡 Warnings

Warning 1 — Recurring detection job failures (8/30 scheduled agentic runs, 26.7%)

The detection job failed in 8 distinct workflows. In each case, downstream jobs (safe_outputs, update_cache_memory, push_repo_memory) were skipped as a result, preventing non-compliant output from being published. This behavior is consistent with the DIFC pipeline operating as designed (detection failure → block output), but the frequency across diverse workflows warrants investigation to distinguish intentional policy blocks from false positives or detection misconfigurations.

Affected runs:

Run ID Workflow Link
23536282568 Daily Issues Report Generator view
23536088024 Copilot PR Conversation NLP Analysis view
23533897128 Daily News view
23533655796 Dev view
23533610312 Daily MCP Tool Concurrency Analysis view
23532887448 Architecture Diagram Generator view
23528528102 Auto-Triage Issues view
23527672303 The Great Escapi view

In all 8 cases the job sequence was: activation ✅ → agent ✅ → detection ❌ → safe_outputs ⏭ → conclusion

This means the agents completed execution and uploaded artifacts before detection ran. The detection failure correctly blocked the final write/publish step.

Warning 2 — DIFC secret-scope filtering blocked audit agent access to logs and artifacts

All attempts to download workflow artifacts or retrieve job logs were blocked by DIFC:

[DIFC] 1 item(s) in this response were removed by integrity policy and are not shown:
resource:actions_get (Resource 'resource:actions_get' has secrecy requirements that
agent doesn't meet. The agent is not authorized to access [secret]-scoped data.)

This prevented direct inspection of rpc-messages.jsonl, mcp-gateway.log, and firewall-audit-logs for DIFC event counts, filtered item ratios, guard errors, and scope violations. While the filtering itself confirms the DIFC system is correctly labeling these resources as [secret], it limits the depth of this automated audit. A privileged audit agent (or manual review) would be needed to inspect the actual integrity tags and filtered counts.

🟢 Informational

Info 1 — DIFC pipeline is active and enforcing access control

All 7 artifact download attempts and all job log requests from this audit agent were correctly filtered with [secret]-scope DIFC labels. This confirms the MCP Gateway's DIFC enforcement is intercepting GitHub API calls made by this agent and applying correct secrecy policies.

Info 2 — 30 action_required runs are pending approval (no execution, no DIFC data)

All 30 issue_comment/PR-triggered runs from the last 24 hours have action_required status — they are awaiting human approval before execution. These include workflows such as Security Review Agent, Grumpy Code Reviewer, Resource Summarizer Agent, ACE Editor Session, Mergefest, Scout, PR Nitpick Reviewer, Q, Archie, Plan Command, Content Moderation, AI Moderator, and others. No DIFC data is available for these runs as they have not yet executed.

Info 3 — 30 push-triggered CI runs are not in DIFC scope

Push event runs (License Compliance Check, Doc Build - Deploy, CI) are infrastructure/build workflows without the agentic MCP pipeline (no activation/agent/detection job structure). All 30 completed successfully. These are not expected to have DIFC events.

Info 4 — 22/30 scheduled agentic runs completed the full DIFC pipeline successfully

Successful workflows (detection passed) include:

  • Daily Security Red Team Agent (×1)
  • Issue Monster (×8)
  • Glossary Maintainer (×1)
  • Daily Team Status (×1)
  • Dependabot Dependency Checker (×1)
  • Contribution Check (×1)
  • Go Fan (×1)
  • PR Triage Agent (×1)
  • CI Cleaner (×1)
  • Bot Detection (×1)
  • CodeQL Security Analysis (×1)
  • Code Simplifier (×1)
  • Agentic Maintenance (×2 — different structure, no detection job)
  • Doc Build - Deploy (×1 — no detection job)

Runs Analyzed

Run Workflow Branch Detection Status
23536646061 Daily Security Red Team Agent main ✅ pass ✅ success
23536282568 Daily Issues Report Generator main ❌ fail ❌ failure
23536242971 Issue Monster main ✅ pass ✅ success
23536088024 Copilot PR Conversation NLP Analysis main ❌ fail ❌ failure
23535836784 Glossary Maintainer main ✅ pass ✅ success
23534900947 Issue Monster main ✅ pass ✅ success
23533907879 Issue Monster main ✅ pass ✅ success
23533898201 Daily Team Status main ✅ pass ✅ success
23533897128 Daily News main ❌ fail ❌ failure
23533774176 Dependabot Dependency Checker main ✅ pass ✅ success
23533655796 Dev main ❌ fail ❌ failure
23533610312 Daily MCP Tool Concurrency Analysis main ❌ fail ❌ failure
23533249744 Contribution Check main ✅ pass ✅ success
23532887448 Architecture Diagram Generator main ❌ fail ❌ failure
23532834396 Agentic Maintenance main n/a ✅ success
23532561793 Issue Monster main ✅ pass ✅ success
23531650379 Issue Monster main ✅ pass ✅ success
23530676925 Issue Monster main ✅ pass ✅ success
23529854648 Issue Monster main ✅ pass ✅ success
23529573616 Go Fan main ✅ pass ✅ success
23528919735 Agentic Maintenance main n/a ✅ success
23528528102 Auto-Triage Issues main ❌ fail ❌ failure
23528194354 Issue Monster main ✅ pass ✅ success
23527936494 Bot Detection main ✅ pass ✅ success
23527881970 CodeQL Security Analysis main ✅ pass ✅ success
23527796500 PR Triage Agent main ✅ pass ✅ success
23527747746 CI Cleaner main ✅ pass ✅ success
23527672303 The Great Escapi main ❌ fail ❌ failure
23527161277 Code Simplifier main ✅ pass ✅ success

Plus 30 push-triggered CI runs (all success, no DIFC pipeline) and 30 issue_comment/PR runs (all action_required, pending approval).


Recommendations

  1. Investigate recurring detection failures — Review the detection job logs for the 8 failing workflows (requires privileged access). Determine whether these are intentional policy enforcement (agent took prohibited action) or false positives in detection rules. If intentional, consider documenting the expected failure patterns to distinguish them from anomalies.

  2. Establish privileged audit agent — This audit was significantly limited by DIFC [secret]-scope restrictions on job logs and artifacts. For future integrity audits to inspect rpc-messages.jsonl and mcp-gateway.log, a dedicated audit service account with appropriate secrecy clearance should be established and its scope carefully scoped to read-only access.

  3. Monitor detection failure rate — The 26.7% detection failure rate across diverse workflows is worth tracking over time. A spike could indicate a misconfiguration or a coordinated policy violation attempt. Baseline the normal rate and alert on deviations.

  4. Review action_required approval latency — 30 runs are pending approval with no DIFC coverage. If these workflows are regularly blocked at approval gates, it may indicate friction in the deployment pipeline or overly broad approval requirements.

  5. Consider audit trail continuity — Artifacts for this run have 90-day expiry (most) but the activation artifact expires in 1 day. Ensure the DIFC-relevant artifacts (firewall-audit-logs, detection, agent) are retained long enough for retrospective analysis.

Note

🔒 Integrity filter blocked 2 items

The following items were blocked because they don't meet the GitHub integrity level.

  • actions_get actions_get: has secrecy requirements that agent doesn't meet. The agent is not authorized to access [secret]-scoped data.
  • get_job_logs get_job_logs: has secrecy requirements that agent doesn't meet. The agent is not authorized to access [secret]-scoped data.

To allow these resources, lower min-integrity in your GitHub frontmatter:

tools:
  github:
    min-integrity: approved  # merged | approved | unapproved | none

Generated by Integrity Filtering Audit ·

  • expires on Apr 1, 2026, 10:49 AM UTC

Metadata

Metadata

Assignees

Type

No type
No fields configured for issues without a type.

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions