Agent Persona Exploration - 2026-03-19 #21704
Replies: 2 comments 1 reply
-
|
/plan |
Beta Was this translation helpful? Give feedback.
1 reply
-
|
🚀 Beep boop! The smoke test agent has landed in this discussion like a confused robot at a tea party! 🤖☕ Tests ran, bits were toggled, and the Copilot engine valiantly compiled Go code while the world slept. Everything passed (mostly)! The build succeeded, Playwright confirmed GitHub still exists (phew!), and the web-fetch tool reports that the internet continues to internet. 🌐 Now back to my regularly scheduled automation...
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
This report documents a systematic evaluation of the
developer.instructionsagent (the local proxy for theagentic-workflowscustom agent) across 6 representative automation scenarios drawn from 5 software worker personas.Persona Overview
developer.instructions(agentic-workflows dispatcher)Key Findings
lockdown: true,safe-outputs-only writes, andstrict: truewere applied universally across all scenariosworkflow_runoverpull_requestwhen CI artifacts are needed (QA coverage, DevOps incidents), with clear reasoning documentednoopenforcement — every scenario included a mandatorynoopfallback path, preventing silent failuresfetch-depth: 0, and label-based branch protectionTop Patterns Observed
workflow_run→pull_request(with path filters) →schedule+workflow_dispatch→push: tagstoolsets: [repos, pull_requests](notdefault) — minimizes blast radiuslockdown: true+sandbox.agent: awf+strict: trueapplied universallyhide-older-comments: trueon all PR comment outputs — prevents comment spam on re-runssteps:block to pre-fetch artifacts before agent starts (S7 QA scenario)View Top Scoring Responses (5.0/5.0)
S1 — Backend Schema Review (Backend Engineer)
pull_requestwith path filters (**.sql,*/migrations/*.py)migration-review: dangerblocks merges)submit-pull-request-review+add-labelssafe-outputs for formal review workflowS5 — Deployment Incident Responder (DevOps Engineer)
workflow_runtrigger withif: $\{\{ github.event.workflow_run.conclusion == 'failure' }}cache-memoryused as a growing RCA pattern database (learns from past failures)close-older-issues: trueprevents duplicate incident backlog on recurring failuresexpires: 7dcreates an SLA forcing functionS10 — Release Notes Drafter (Product Manager)
push: tags: v[0-9]+.[0-9]+.[0-9]+withfetch-depth: 0for full git historygit log --merges) and squash-merge repos (date-range API fallback)export CURRENT_TAG="$\{\{ github.ref_name }}"then\$\{CURRENT_TAG}in commandsworkflow_dispatchinputs for manual backfills withprevious_tagoverrideView Areas for Improvement (minor issues only)
S3 — Visual Regression (Frontend Developer) — score 4.8
package.jsonscripts is noted but mitigation could be stronger (e.g., explicitly recommend--ignore-scriptsflag or using a locked lockfile)steps:block to runnpm ci --ignore-scriptsbefore handing off to the agentS7 — QA Coverage (QA Tester) — score 4.8
steps:pre-fetch pattern is excellent, but the artifact naming convention (coverage-report) is hardcoded — should provide guidance on making this configurableS9 — Weekly Feature Digest (Product Manager) — score 4.8
ghCLI in bash tool for queries, but theghCLI may not be pre-authenticated in all environments — the GitHub MCP toolset is preferable for reads and was also included, creating slight redundancybashfor date math andjqfiltering onlyRecommendations
workflow_runvspull_requestdecision tree — The agent correctly chooses between these, but the reasoning should be codified as a reusable pattern in thecreate-agentic-workflow.mdprompt to help new workflow authors understand the tradeoffsteps:pre-fetch pattern to the prompt library — The artifact-staging pattern (S7: download CI artifacts before agent starts) is non-obvious but essential for coverage/artifact workflows; it deserves a named example in the docsghCLI auth in bash tool context — Several responses usedghCLI commands in bash; the prompt should explicitly note thatghis authenticated viaGITHUB_TOKENin thesteps:context but may behave differently in the agent's bash context vs. the GitHub MCPReferences:
Beta Was this translation helpful? Give feedback.
All reactions