You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This comprehensive statistical analysis examines 150 agentic workflow lock files (.lock.yml) in the github/gh-aw repository, providing insights into usage patterns, structural characteristics, and configuration trends across the workflow ecosystem.
Key Highlights:
Total Lock Files: 150 workflows
Total Size: 9.35 MB (8.91 MB)
Average File Size: 60.84 KB
Primary Engine: GitHub Copilot CLI (68.7% of workflows)
Most Common Trigger: workflow_dispatch (135 workflows, 90%)
Insight: The overwhelming majority (92%) of workflows fall in the 50-100 KB range, indicating a consistent and well-optimized workflow structure across the repository.
Use case: Unified response agents across all interaction types
Insight: The dominance of workflow_dispatch (90%) and schedule (72.7%) indicates a preference for controlled, predictable workflow execution rather than event-driven automation.
Schedule Patterns
View Detailed Cron Schedule Analysis
Most Common Schedule Frequencies
Cron Pattern
Count
Description
0 14 * * 1-5
4
Daily at 2:00 PM UTC (weekdays)
0 13 * * 1-5
4
Daily at 1:00 PM UTC (weekdays)
0 11 * * 1-5
4
Daily at 11:00 AM UTC (weekdays)
0 9 * * 1-5
3
Daily at 9:00 AM UTC (weekdays)
0 15 * * 1-5
2
Daily at 3:00 PM UTC (weekdays)
0 16 * * 1-5
2
Daily at 4:00 PM UTC (weekdays)
0 10 * * 1-5
2
Daily at 10:00 AM UTC (weekdays)
0 */6 * * *
2
Every 6 hours
*/30 * * * *
1
Every 30 minutes (most frequent)
Various hourly/daily
85+
Distributed across different times
Scheduling Insights:
Weekday Preference: Many schedules use 1-5 (Monday-Friday) pattern, respecting business days
Time Distribution: Schedules are well-distributed across UTC hours to avoid concentrated load
Frequency Range: From every 30 minutes to weekly (Sunday schedules)
Peak Hours: Most activity scheduled during 9 AM - 4 PM UTC (business hours)
Safe Outputs Analysis
Safe outputs are the primary mechanism for workflows to produce user-visible results (issues, discussions, comments, etc.).
Safe Output Type Distribution
Safe Output Type
Count
Usage
Primary Purpose
noop
1,859
95.0%
Status logging when no action needed
add-comment
98
5.0%
Adding comments to issues/PRs
Important Finding: The overwhelming use of noop (1,859 occurrences vs. 98 for add-comment) suggests that:
Most workflow runs complete analysis without requiring GitHub API modifications
Workflows prioritize transparency by logging completion status even when no action is taken
The "no news is good news" pattern is common - many audits and checks produce output only when issues are found
Workflows Using Multiple Safe Output Types
26 workflows use multiple safe output types, combining noop (for status) with add-comment (for findings):
View Workflows with Multiple Safe Outputs
smoke-codex.lock.yml
craft.lock.yml
tidy.lock.yml
changeset.lock.yml
cloclo.lock.yml
smoke-temporary-id.lock.yml
archie.lock.yml
poem-bot.lock.yml
unbloat-docs.lock.yml
workflow-generator.lock.yml
plan.lock.yml
smoke-claude.lock.yml
pdf-summary.lock.yml
notion-issue-summary.lock.yml
smoke-opencode.lock.yml
q.lock.yml
issue-classifier.lock.yml
scout.lock.yml
grumpy-reviewer.lock.yml
mergefest.lock.yml
smoke-copilot.lock.yml
smoke-project.lock.yml
mcp-inspector.lock.yml
brave.lock.yml
security-review.lock.yml
pr-nitpick-reviewer.lock.yml
Pattern: These workflows typically:
Perform analysis or checks
Use noop to report "all clear" status
Use add-comment to report findings when issues are detected
Structural Characteristics
Job Complexity
Average Jobs per Workflow: 1.0
Job Count Distribution: All workflows have exactly 1 job named "agent"
Architecture: Consistent single-job pattern across all workflows
Insight: The uniform single-job architecture indicates a standardized workflow pattern, where complexity is managed within job steps rather than through multiple parallel jobs.
Step Complexity
Average Steps per Workflow: 73.43 steps
Maximum Steps: 102 steps (daily-copilot-token-report.lock.yml)
Standardized Architecture: 100% of workflows follow a consistent pattern:
Single job named "agent"
60-85 steps on average
Concurrency control enabled
Manual triggering capability
"Progressive Disclosure" Pattern: Extensive use of noop (1,859 occurrences) demonstrates a mature pattern where workflows report status even when no action is needed, improving transparency and debuggability.
Weekday Scheduling: Many scheduled workflows explicitly target weekdays (1-5 pattern), respecting business hours and reducing weekend noise.
Engine Diversity: Despite Copilot's dominance (68.7%), the repository maintains 4 different engines, enabling A/B testing and specialized capabilities.
Conservative MCP Adoption: Only 28% of workflows use MCP servers, suggesting most tasks can be accomplished with built-in tools and GitHub API access.
Size Consistency: 92% of workflows fall in the 50-100 KB range, indicating predictable resource requirements and consistent workflow patterns.
Minimal Permissions: Empty top-level permissions with job-level grants follow security best practices.
Recommendations
Based on the analysis, here are actionable recommendations:
Standardize Schedule Distribution: Consider load-balancing scheduled workflows more evenly across UTC hours to prevent potential bottlenecks during peak times (9 AM - 4 PM UTC).
MCP Server Expansion: With only 28% of workflows using MCP servers, there may be opportunities to:
Create more specialized MCP servers for common tasks
Document MCP best practices to encourage adoption
Identify workflows that could benefit from MCP integration
Engine Performance Tracking: With 4 different engines, establish metrics to compare:
Execution time
Success rate
Resource consumption
Output quality
Safe Output Expansion: Consider adding more safe output types beyond noop and add-comment:
create-issue for findings requiring tracking
create-discussion for analysis reports
update-issue for status updates on existing issues
Timeout Optimization: Review the ~22-minute average timeout:
Identify workflows that consistently complete much faster (candidates for reduced timeout)
Monitor workflows approaching timeout limits (candidates for optimization)
Size Optimization: Investigate the 2 workflows over 100 KB:
smoke-copilot.lock.yml (108 KB)
Identify if size indicates complexity that could be modularized
Methodology
Analysis Tool: Python script with regex-based YAML parsing
Lock Files Analyzed: 150
Data Sources: .github/workflows/*.lock.yml
Cache Memory: Scripts and data persisted to /tmp/gh-aw/cache-memory/ for reuse
Historical Tracking: Results saved to cache-memory/history/2026-02-14.json
Technical Approach:
Enumerated all .lock.yml files in workflows directory
Parsed each file for structural elements (triggers, jobs, steps, etc.)
Extracted safe output patterns, MCP server usage, and scheduling
Aggregated statistics and generated distribution metrics
Identified patterns and combinations across workflows
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
Executive Summary
This comprehensive statistical analysis examines 150 agentic workflow lock files (
.lock.yml) in thegithub/gh-awrepository, providing insights into usage patterns, structural characteristics, and configuration trends across the workflow ecosystem.Key Highlights:
workflow_dispatch(135 workflows, 90%)File Size Distribution
Size Statistics:
codex-github-remote-mcp-test.lock.ymlsmoke-copilot.lock.ymlInsight: The overwhelming majority (92%) of workflows fall in the 50-100 KB range, indicating a consistent and well-optimized workflow structure across the repository.
Trigger Analysis
Most Popular Triggers
workflow_dispatchschedulepull_requestissue_commentissuespull_request_review_commentdiscussion_commentdiscussionworkflow_runpushCommon Trigger Combinations
schedule+workflow_dispatch: 100 workflows (66.7%)workflow_dispatchonly: 18 workflows (12.0%)pull_request+schedule+workflow_dispatch: 6 workflows (4.0%)issuesonly: 4 workflows (2.7%)Multi-event listeners (discussion, issue, PR, comments): 3 workflows (2.0%)
Insight: The dominance of
workflow_dispatch(90%) andschedule(72.7%) indicates a preference for controlled, predictable workflow execution rather than event-driven automation.Schedule Patterns
View Detailed Cron Schedule Analysis
Most Common Schedule Frequencies
0 14 * * 1-50 13 * * 1-50 11 * * 1-50 9 * * 1-50 15 * * 1-50 16 * * 1-50 10 * * 1-50 */6 * * **/30 * * * *Scheduling Insights:
1-5(Monday-Friday) pattern, respecting business daysSafe Outputs Analysis
Safe outputs are the primary mechanism for workflows to produce user-visible results (issues, discussions, comments, etc.).
Safe Output Type Distribution
noopadd-commentImportant Finding: The overwhelming use of
noop(1,859 occurrences vs. 98 foradd-comment) suggests that:Workflows Using Multiple Safe Output Types
26 workflows use multiple safe output types, combining
noop(for status) withadd-comment(for findings):View Workflows with Multiple Safe Outputs
Pattern: These workflows typically:
noopto report "all clear" statusadd-commentto report findings when issues are detectedStructural Characteristics
Job Complexity
Insight: The uniform single-job architecture indicates a standardized workflow pattern, where complexity is managed within job steps rather than through multiple parallel jobs.
Step Complexity
daily-copilot-token-report.lock.yml)codex-github-remote-mcp-test.lock.yml)Step Count Distribution:
Average Lock File Structure
Based on statistical analysis, a typical
.lock.ymlfile has:workflow_dispatch+schedulenoopprimary,add-commentconditionalPermission Patterns
Finding: No explicit job-level permissions were detected in the analysis (empty permissions object).
Interpretation:
permissions: {}(empty permissions)Tool & MCP Patterns
MCP Server Usage
githubplaywrightarxivdeepwikiKey Insights:
Engine Distribution
The repository uses multiple AI engines to power agentic workflows:
Engine Strategy Insights:
Concurrency & Timeout Patterns
Concurrency Control
gh-aw-$\{\{ github.workflow }}orgh-aw-copilot-$\{\{ github.workflow }}Benefit: Prevents resource waste and ensures only one instance of each workflow runs at a time.
Timeout Configuration
Timeout Strategy:
Interesting Findings
Standardized Architecture: 100% of workflows follow a consistent pattern:
"Progressive Disclosure" Pattern: Extensive use of
noop(1,859 occurrences) demonstrates a mature pattern where workflows report status even when no action is needed, improving transparency and debuggability.Weekday Scheduling: Many scheduled workflows explicitly target weekdays (
1-5pattern), respecting business hours and reducing weekend noise.Engine Diversity: Despite Copilot's dominance (68.7%), the repository maintains 4 different engines, enabling A/B testing and specialized capabilities.
Conservative MCP Adoption: Only 28% of workflows use MCP servers, suggesting most tasks can be accomplished with built-in tools and GitHub API access.
Size Consistency: 92% of workflows fall in the 50-100 KB range, indicating predictable resource requirements and consistent workflow patterns.
Minimal Permissions: Empty top-level permissions with job-level grants follow security best practices.
Recommendations
Based on the analysis, here are actionable recommendations:
Standardize Schedule Distribution: Consider load-balancing scheduled workflows more evenly across UTC hours to prevent potential bottlenecks during peak times (9 AM - 4 PM UTC).
MCP Server Expansion: With only 28% of workflows using MCP servers, there may be opportunities to:
Engine Performance Tracking: With 4 different engines, establish metrics to compare:
Safe Output Expansion: Consider adding more safe output types beyond
noopandadd-comment:create-issuefor findings requiring trackingcreate-discussionfor analysis reportsupdate-issuefor status updates on existing issuesTimeout Optimization: Review the ~22-minute average timeout:
Size Optimization: Investigate the 2 workflows over 100 KB:
smoke-copilot.lock.yml(108 KB)Methodology
.github/workflows/*.lock.yml/tmp/gh-aw/cache-memory/for reusecache-memory/history/2026-02-14.jsonTechnical Approach:
.lock.ymlfiles in workflows directoryReferences:
Analysis generated on 2026-02-14 by Lockfile Statistics Analysis Agent
Beta Was this translation helpful? Give feedback.
All reactions