[integrity] DIFC Integrity-Filtered Events Report — 2026-04-15 #26494
Closed
Replies: 1 comment
-
|
This discussion was automatically closed because it expired on 2026-04-18T21:08:27.350Z.
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Executive Summary
In the last 7 days, 229 DIFC integrity-filtered events were detected across 31 workflow runs and 8 distinct workflows. All events were filtered by the github MCP server, and the dominant filter reason is that resources carry the
none:allintegrity tag — meaning issues and PRs opened by external contributors have not yet been approved/elevated to "approved" integrity. The most frequently filtered tool waslist_issues(107 events), followed closely bysearch_issues(95 events). Events are overwhelmingly concentrated on 2026-04-15 (227 of 229 events), with a pronounced activity spike between 09:00 and 10:00 UTC.The filtering activity is driven primarily by issue-processing workflows — Dev (75 events), Issue Triage Agent (50 events), and Sub-Issue Closer (50 events) — which routinely scan the issue backlog and encounter GitHub issues filed by external users who have not yet been approved. This is expected system behaviour: the DIFC integrity gate is working as designed by blocking unvetted content from influencing agentic actions.
Key Metrics
none:alltag)📈 Events Over Time
Events are almost entirely concentrated on April 15, 2026, with virtually no activity on April 14 (2 events). The April 15 spike is the result of multiple scheduled and PR-triggered agentic workflow runs executing in the same window. There is no ongoing upward trend; activity reflects natural workflow execution patterns rather than a growing filtering problem.
🔧 Top Filtered Tools
list_issues(107) andsearch_issues(95) dominate — both are bulk read operations invoked by triage, closing, and team-evolution workflows that scan the entire issue backlog.pull_request_read(26) reflects the Design Decision Gate reviewing Copilot-authored PRs that haven't yet been approved. A singleget_commitevent appeared from the Go Fan workflow examining a commit on an external repo. All filtering is integrity-based; no secrecy-based filtering was detected.🏷️ Filter Resource Types & Tags
Issues (
issue:) account for ~89% of filtered resources, with PRs (pr:) at ~10% and one commit (commit:). Every event carries thenone:allintegrity tag (229/229 events), with 9 events additionally taggedunapproved:all. No secrecy tags were observed — secrecy-based filtering is not occurring. The integrity gate is correctly blocking resources whose authors have not been approved in the repository's trust model.📋 Per-Workflow Breakdown
📋 Per-Server Breakdown
👤 Per-User Breakdown
🔍 Per-User Analysis
The 26 "unknown" author events correspond to PR-read calls where no
author_loginmetadata is captured (e.g.,pull_request_readfiltered events). Of the identified users, all are human contributors filing issues on the repository — none are bot accounts. yskopets (19 events) and samuelkahessay (15 events) appear most frequently because their issues are repeatedly encountered across multiple triage and closing workflow runs. This is expected: recurring issue scans will re-encounter the same unapproved issues on each run. There is no indication of malicious or unusual behaviour — the filtering is consistent with legitimate open-source contribution patterns.💡 Tuning Recommendations
Approve high-frequency issue authors: Users like
yskopets(19 hits),samuelkahessay(15 hits), andmicrosasa/strawgate(9 each) have multiple issues that are repeatedly filtered. Consider reviewing and approving their contributions to reduce noise in triage runs.Cache filtered issue IDs in triage workflows: The Issue Triage Agent and Sub-Issue Closer encounter the same unapproved issues on every scheduled run. Implementing a skip-list or cache for known-filtered resources would reduce redundant integrity checks and improve agent efficiency.
Review the
unapproved:allsubset: 9 events carry the stricterunapproved:alltag. These may indicate resources that have been explicitly marked as untrusted. Review these issues/PRs to ensure the labelling is intentional.Monitor the Design Decision Gate PR filtering: 26 PR-read events across multiple Copilot-authored branches suggest the Design Decision Gate frequently encounters PRs from branches with
none:allintegrity. If these are all Copilot agent branches, consider whether Copilot-authored PRs should receive elevated integrity by default.Review Go Fan and GitHub Remote MCP Auth Test: Both had isolated 1-event filtering incidents. These are likely one-off occurrences (an external commit and an authentication test run) but should be monitored for recurrence.
No secrecy tuning needed: No secrecy-based filtering was detected. The filtering is entirely integrity-based and is operating as intended.
Generated by the Daily Integrity Analysis workflow
Analysis window: Last 7 days | Repository: github/gh-aw
Run: §24475941416
Beta Was this translation helpful? Give feedback.
All reactions