[daily regulatory] Regulatory Report - 2026-04-08 #25389
Closed
Replies: 1 comment
-
|
This discussion has been marked as outdated by Daily Regulatory Report Generator. A newer discussion is available at Discussion #25706. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
8 daily reports reviewed for April 8, 2026 (plus 1 April 7 observability report). Overall data quality is good with consistent cross-report metrics, but two operational blockers require urgent attention: static analysis has been dark for 4+ days due to a
--runner-guardflag issue, and MCP telemetry coverage sits at a critically low 35.7%. The PR merge rate continues its healthy upward trend (83.2%), safe-output health is at 100% for the fourth consecutive day, and firewall block rates are low and consistent across reports. A 67% single-day spike in[aw]workflow failures (15→25) and 4 untiaged security findings are the most pressing near-term risks.Cross-report consistency is strong — all shared metrics (firewall block rate, PR merge rate, session counts) agree within acceptable tolerances. No true numerical discrepancies were detected. The main data quality concern is coverage gaps, not data conflicts.
📋 Full Regulatory Report
📊 Reports Reviewed
🔍 Data Consistency Analysis
Cross-Report Metrics Comparison
Reference scratchpad/metrics-glossary.md for metric definitions and scopes.
firewall_requests_blockedrateworkflow_runs_analyzed(firewall)agent_prs_total(24h)Scope Notes:
agent_prs_total(32): Copilot Agent Analysis uses 24h window (Apr 7T11:40Z → Apr 8T11:40Z); Team Evolution uses ~24h with slightly different boundary (~43 commits/40+ PRs) — scopes differ by design.Consistency Score
Critical Issues
1. Static Analysis Dark Since April 4
copilot/add-runner-guard-arg-to-compilebranch introduced--runner-guardinto the static analysis workflow before the flag was implemented. All scans since April 5 fail at compile time.copilot/add-runner-guard-arg-to-compile. Prioritize restoring daily scans.2. MCP Telemetry Coverage at 35.7%
observability_coverage_percentage(MCP)rpc-messages.jsonlorgateway.jsonl). 9 runs have zero MCP telemetry.Warnings
3. Workflow Failure Spike (+67% Single Day)
runner-guardPR compilation disruption; Copilot engine instability (7+exit code 1failures noted by Team Evolution).4. Cross-Repo Credentials Failing for 3+ Days
Smoke Create Cross-Repo PRandSmoke Update Cross-Repo PRhave been failing withBad credentialstogithubnext/gh-aw-side-reposince at least April 6.5. Security Findings Untiaged (24h+)
gh-aw-security-findingissues (MCP container images pulled without SHA-256 digest pinning;node:lts-alpineuses floating LTS tag #25071, Claude engine should pinclaude-codeto a verified version and restrict sandbox env/network for npm operations #25101, Claude engine safeoutputs MCP shared bearer token enables direct write-sink bypass in local-analysis environment #25102, agent-stdio.log must be mode 0600 and MCP gateway tokens must be masked in log pipelines #25103) from April 7 carry no severity labels or assignees after 24+ hours.6. Two Copilot Branches Stalled (HIGH Abandonment Risk)
copilot/fix-duplicate-https-schemeandcopilot/fix-actionlint-failure-handling— each with 14 sessions today, all review-botaction_required, zero Copilot coding agent activity.Data Quality Notes
--runner-guardcompile issue — good transparencyfirewall=Critical)agent_prs_totaldiscrepancy between Copilot Agent Analysis (32 PRs) and Team Evolution (~40+ PRs merged) is explained by different time windows and scope — not a true discrepancy📈 Trend Analysis
Week-over-Week Comparison
Notable Trends
📝 Per-Report Analysis
Safe Output Health Report (#25308)
Time Period: Last 24 hours / last 50 runs (302 total run directories)
Quality: ✅ Valid
safe_output_executionssafe_output_failuresNotes: Only 2 of 302 total workflow run directories triggered safe outputs today — very low activity. Cross-repo bad credentials recurring for 3+ days without resolution.
Daily Firewall Report (#25286)
Time Period: Last 7 days (analysis date: April 8, 2026)
Quality: ✅ Valid
firewall_enabled_workflowsfirewall_requests_totalfirewall_requests_allowedfirewall_requests_blockedfirewall_domains_blockedNotes: Math checks pass (608+18=626). 72% of blocked requests are Codex engine ChatGPT telemetry — expected, benign. Changeset Generator missing
githubpreset is a misconfiguration flagged for immediate fix.Copilot Agent Analysis (#25278)
Time Period: 24h window (Apr 7T11:40Z → Apr 8T11:40Z)
Quality: ✅ Valid
agent_prs_totalagent_prs_mergedagent_success_rateNotes: Note 1 — "Success rate 86%" counts merged (24) + still open (4) as 28 non-failures out of 32 total. This differs from a strict merged/total ratio (75%). The report's success rate methodology is internally consistent. Yesterday's comparison shows 41/52 = 79% merged, 86% reported success rate — same methodology.
Copilot Session Insights (#25291)
Time Period: April 8, 2026 + 10-day historical trend
Quality: ✅ Valid
agent_success_rate(Copilot only)Notes: 1+43+6=50 ✓. Overall 2% completion rate reflects review bots returning
action_requiredby design — not true failures. 10-day data adds useful longitudinal context.Daily Team Evolution Insights (#25270)
Time Period: Last 24h (Apr 7–8, 2026)
Quality: ✅ Valid
Notes: Estimates are narrative-derived, not precise counts — a reporting limitation for this workflow. The "40+ PRs merged" is broadly consistent with Copilot Agent Analysis's 24 agent PRs + human/bot PRs.
Static Analysis Report (#25316)
Time Period: April 8 scan ❌ (last successful: April 4, 2026)
Quality: ❌ Failed
Notes: Report transparently documented the failure cause and historical data. Trend shows +35% growth in findings over 7 scans (7,383 → 9,956) as new workflows are added.
DeepReport Intelligence Briefing (#25328)
Time Period: Apr 1 → Apr 8, 2026 (7-day primary analysis)
Quality: ✅ Valid
Notes: DeepReport explicitly cited sources for its numbers, enabling traceability. Good cross-report methodology.
Sergo Report (#25379)
Time Period: April 8, 2026 (code analysis)
Quality: ✅ Valid
Notes: Code quality analysis focused on
io.Writerrefactor opportunity (19 unsafe stdout-swap patterns in tests), vestigialinit()functions (3rd consecutive report), and context-unawaretime.Sleep. Consistent with prior Sergo reports.Observability Coverage Report (#25197, April 7)
Time Period: Last 7 days (from April 7 run)⚠️ Issues
Quality:
workflow_runs_analyzedNotes: The observability workflow itself was the run missing its firewall
access.log— an ironic self-reference. MCP coverage at 35.7% is the most urgent systemic gap.💡 Recommendations
Process Improvements
Restore Static Analysis Immediately: Merge or revert
copilot/add-runner-guard-arg-to-compile. Four days without scans on a growing codebase (181 workflows, 9,956 known findings) is a material security risk.Mandate MCP Telemetry in All MCP Workflows: Add a post-run observability check that fails runs when MCP is enabled but no telemetry artifact is published. 35.7% coverage is insufficient for incident response.
Renew Cross-Repo PAT:
githubnext/gh-aw-side-repocredentials have been invalid for 3+ consecutive days. This blocks smoke test coverage for cross-repo workflows.Data Quality Actions
Triage Security Findings Within 24h: Establish SLA for
gh-aw-security-findingissues. The 4 open April 7 findings (MCP container images pulled without SHA-256 digest pinning;node:lts-alpineuses floating LTS tag #25071, Claude engine should pinclaude-codeto a verified version and restrict sandbox env/network for npm operations #25101, Claude engine safeoutputs MCP shared bearer token enables direct write-sink bypass in local-analysis environment #25102, agent-stdio.log must be mode 0600 and MCP gateway tokens must be masked in log pipelines #25103) need severity labels and owners today.Standardize PR Count Methodology: Team Evolution and Copilot Agent Analysis report slightly different PR counts due to different time windows. Align on UTC cutoff time for daily reporting windows.
Investigate Copilot Engine Exit Code 1 Failures: 7+ unexpected terminations today may be related to CLI version 1.0.20→1.0.21 bump. Correlate with version bump commit timestamp.
Workflow Suggestions
Add Firewall Block Rate Cross-Check: Both Firewall Report and DeepReport independently reported 2.9% block rate with exact agreement — evidence that DeepReport's source attribution is working well. Formalize this cross-check.
Track Branch Stall Rate Metric: As suggested by DeepReport — flag branches with 5+ consecutive
action_requiredsessions. Two currently stalled branches are consuming CI resources.📊 Regulatory Metrics
References:
Beta Was this translation helpful? Give feedback.
All reactions