Skip to content

[deep-report] Fix Copilot PR Prompt Analysis: expand firewall allow-list to stop 48% block rate #28299

@github-actions

Description

@github-actions

Description

The Copilot PR Prompt Analysis workflow had 14 out of 29 network requests (48%) blocked by the firewall in run §24873452527. All blocked requests originated from an (unknown) domain — likely GitHub API endpoints (api.github.com:443) that the agent needs to fetch PR data. The narrow allow-list (api.githubcopilot.com:443 only) is causing excessive retries, a 15-turn session, 641,789 tokens, and ultimately a GitHub timeout when creating the output discussion.

Evidence:

  • Total requests: 29 — Blocked: 14 (48%)
  • Blocked domain: (unknown) (unresolved hostnames)
  • Allow-listed: api.githubcopilot.com:443 only
  • Result: safe_outputs timeout ("We couldn't respond to your request in time")

Expected Impact

Restores reliable daily PR pattern analysis. Reducing blocked requests from 48% to ~0% should cut token usage by ~40% and eliminate the discussion creation timeout.

Suggested Agent

An agent should: (1) inspect agent-stdio.log for run §24873452527 to identify exact blocked domains, (2) add the required domains (likely api.github.com:443, possibly raw.githubusercontent.com:443) to the workflow's network allow-list in the frontmatter, (3) recompile the lock file.

Estimated Effort

Quick (< 1 hour) — log inspection + frontmatter update.

Data Source

DeepReport Intelligence Briefing — April 24, 2026 (run §24896194233). Full investigation in #28219.

Generated by DeepReport - Intelligence Gathering Agent · ● 570.7K ·

  • expires on Apr 26, 2026, 3:15 PM UTC

Metadata

Metadata

Type

No type
No fields configured for issues without a type.

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions