Skip to content

[P2] Recurring THREAT_DETECTION_RESULT parse failure in detection job #28063

@github-actions

Description

@github-actions

Affected workflows: Duplicate Code Detector, Daily Choice Type Test
Pattern: detection job fails with "No THREAT_DETECTION_RESULT found in detection log"
Frequency: Recurring — observed Apr 22 and Apr 23

Error

❌ Failed to parse detection result: No THREAT_DETECTION_RESULT found in detection log. 
The detection model may have failed to follow the output format.
💡 This usually means the AI engine did not produce the expected output format.
   Expected format: THREAT_DETECTION_RESULT:{"prompt_injection":bool,"secret_leak":bool,...}

Affected Runs

Analysis

The threat detection model is not consistently outputting the THREAT_DETECTION_RESULT: JSON format. This could indicate:

  1. The detection model prompt is not clear enough to enforce structured output
  2. Model changes (version drift) causing format non-compliance
  3. Long workflow content causing the detection step to exceed context/token limits, truncating the output

Recommendations

  1. Check if threat detection uses a specific model version — model updates may have changed output behavior
  2. Add structured output enforcement (if supported) to the detection model call
  3. Review the detection prompt for these workflows to ensure the output format instruction is prominent
  4. Consider adding a retry mechanism for detection parse failures

References:

Generated by Workflow Health Manager - Meta-Orchestrator · ● 2M ·

  • expires on Apr 24, 2026, 12:17 PM UTC

Metadata

Metadata

Labels

cookieIssue Monster Loves Cookies!

Type

No type
No fields configured for issues without a type.

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions