Affected workflows: Duplicate Code Detector, Daily Choice Type Test
Pattern: detection job fails with "No THREAT_DETECTION_RESULT found in detection log"
Frequency: Recurring — observed Apr 22 and Apr 23
Error
❌ Failed to parse detection result: No THREAT_DETECTION_RESULT found in detection log.
The detection model may have failed to follow the output format.
💡 This usually means the AI engine did not produce the expected output format.
Expected format: THREAT_DETECTION_RESULT:{"prompt_injection":bool,"secret_leak":bool,...}
Affected Runs
Analysis
The threat detection model is not consistently outputting the THREAT_DETECTION_RESULT: JSON format. This could indicate:
- The detection model prompt is not clear enough to enforce structured output
- Model changes (version drift) causing format non-compliance
- Long workflow content causing the detection step to exceed context/token limits, truncating the output
Recommendations
- Check if threat detection uses a specific model version — model updates may have changed output behavior
- Add structured output enforcement (if supported) to the detection model call
- Review the detection prompt for these workflows to ensure the output format instruction is prominent
- Consider adding a retry mechanism for detection parse failures
References:
Generated by Workflow Health Manager - Meta-Orchestrator · ● 2M · ◷
Affected workflows: Duplicate Code Detector, Daily Choice Type Test
Pattern:
detectionjob fails with "No THREAT_DETECTION_RESULT found in detection log"Frequency: Recurring — observed Apr 22 and Apr 23
Error
Affected Runs
Analysis
The threat detection model is not consistently outputting the
THREAT_DETECTION_RESULT:JSON format. This could indicate:Recommendations
References: