Replies: 3 comments 2 replies
-
Hi Agent actions in gh-aw use both the GitHub Actions runtime and a dedicated approval model — defense-in-depth rather than one or the other. The AI agent step runs read-only by default. To comment, open PRs, or modify files, the workflow must declare explicit safe outputs. These execute in separate GitHub Actions jobs with scoped write tokens, so the agent itself never holds write credentials. All output is sanitized (secret redaction, URL filtering, size limits) before being applied. safe-outputs:
add-comment:
max: 3
create-pull-request:
max: 1Calls to external tools are constrained by the Agent Workflow Firewall — you explicitly allowlist each domain the agent may reach. For extra control, you can put a GitHub Environment protection rule in front of any safe output job so a designated reviewer must approve before write operations run. Relevant documentation: 🤖 This is an automated response based on our documentation. A team member will follow up if needed.
|
Beta Was this translation helpful? Give feedback.
-
|
Thanks for the detailed breakdown — the Safe Outputs pattern is really interesting, especially separating intent from execution. It feels like a strong foundation from a permissions and isolation standpoint. Curious how you’re thinking about cases where an action is allowed structurally (e.g. create PR or comment), but the specific context makes that action undesirable at that moment. Are teams mostly handling that upstream in prompts, or is there any runtime layer evaluating actions just before execution? |
Beta Was this translation helpful? Give feedback.
-
|
Thanks, this is super helpful — the layering makes sense. What stood out to me is that most of the contextual “should I act?” logic lives in the prompt, with runtime layers acting more as a safety net. Curious how this holds up in practice when the context is ambiguous or slightly off — especially since the decision is still ultimately interpreted by the model. Feels like there might be a gap between intent (what the prompt describes) and enforcement (what actually executes), particularly for actions that are technically allowed but contextually undesirable. Have you seen teams needing something more deterministic at the point of execution, beyond prompt guidance + threat detection? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hey, I’m exploring how agentic workflows are being designed inside CI environments. I was curious how gh-aw thinks about agent actions, especially when an agent wants to comment, open PRs, modify files, or call external tools. Are actions generally constrained by the GitHub Actions runtime, or is there a separate approval model you recommend?
Beta Was this translation helpful? Give feedback.
All reactions