You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The threat detection job is failing with parse_error on a significant fraction of workflow runs (at least 5 confirmed in the last 6 hours), causing the overall GitHub Actions workflow run conclusion to show as failure even when the agent completed its task successfully. This creates false failure issues, noisy dashboards, and obscures real failures.
The detection warnings tracker (#28866) shows parse_error has been firing since at least 06:26 UTC, with 10+ unique workflows affected across the full day.
In GitHub Actions, continue-on-error: true on the detection job allows downstream jobs to run but does not prevent the overall workflow run from being marked as failure. This means every run where detection fails shows as a broken workflow in the GitHub UI and triggers false failure issues.
Probable Root Cause
The detection parser fails to parse the agent output for certain output shapes:
Runs that produce a noop (minimal output) — Design Decision Gate (3×)
Runs that produce heavy copilot output (large JSON blobs) — PR Triage Agent, Daily Repository Chronicle
Possible JSON syntax edge-case or encoding issue in the agent-stdio log that the parser cannot handle
The detection system already records the exact reason in #28866 (parse_error) but the job itself exits non-zero, escalating to a workflow failure.
Proposed Remediation
Quick fix: Change the detection job's exit code behavior — on parse_error, the job should exit 0 (warning) rather than non-zero (failure), since parse errors are not security threats
Root fix: Add structured error logging to the detection parser to surface the exact line/token that fails to parse; fix the underlying parsing bug
Observability: Extend [aw] Detection Runs #28866 comments to include the specific error location (not just the reason code) so failures are debuggable without reading raw logs
Success Criteria
Detection parse_error no longer causes workflow run conclusion: failure
Zero false-positive failure issues created due to detection parse failures
Parent investigation: #28947
Problem Statement
The threat detection job is failing with
parse_erroron a significant fraction of workflow runs (at least 5 confirmed in the last 6 hours), causing the overall GitHub Actions workflow run conclusion to show asfailureeven when the agent completed its task successfully. This creates false failure issues, noisy dashboards, and obscures real failures.Affected Workflows & Runs (2026-04-28 13:00–19:12 UTC)
The detection warnings tracker (#28866) shows
parse_errorhas been firing since at least 06:26 UTC, with 10+ unique workflows affected across the full day.Failure Signature
In GitHub Actions,
continue-on-error: trueon the detection job allows downstream jobs to run but does not prevent the overall workflow run from being marked asfailure. This means every run where detection fails shows as a broken workflow in the GitHub UI and triggers false failure issues.Probable Root Cause
The detection parser fails to parse the agent output for certain output shapes:
The detection system already records the exact reason in #28866 (
parse_error) but the job itself exits non-zero, escalating to a workflow failure.Proposed Remediation
parse_error, the job should exit 0 (warning) rather than non-zero (failure), since parse errors are not security threatsSuccess Criteria
parse_errorno longer causes workflow runconclusion: failureparse_errorrate reported in [aw] Detection Runs #28866 decreases as root cause is fixedReferences:
Note
🔒 Integrity filter blocked 3 items
The following items were blocked because they don't meet the GitHub integrity level.
list_issues: has lower integrity than agent requires. The agent cannot read data with integrity below "approved".list_issues: has lower integrity than agent requires. The agent cannot read data with integrity below "approved".list_issues: has lower integrity than agent requires. The agent cannot read data with integrity below "approved".To allow these resources, lower
min-integrityin your GitHub frontmatter: