[audit-workflows] Daily Audit Report — 2026-04-26 #28637
Closed
Replies: 1 comment
-
|
This discussion has been marked as outdated by Agentic Workflow Audit Agent. A newer discussion is available at Discussion #28804. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Audit of the last 24 hours of agentic workflow runs across the
github/gh-awrepository. 53 total runs completed or are in progress, with a 90% success rate (45/50 concluded runs). No missing tools or MCP failures were detected. Total estimated cost for Claude-engine runs: $12.59.Summary
Engine Mix: Claude=16 (30%) · Copilot=34 (64%) · Codex=1 (2%) · Unknown=2 (4%)
Workflow Health
The overall health is strong at 90% success rate. The 5 cancellations are concentrated in Smoke CI (4 runs) and Deployment Incident Monitor (1 run). Since this is the first audit with repo memory initialized, no historical trend comparison is available — this run establishes the baseline.
Token Usage & Cost
Sergo - Serena Go Expert consumed the most tokens in a single run (6.58M, 99 turns, $3.06), while Design Decision Gate accumulated the highest overall cost across 10 runs ($3.79 total). Copilot-engine runs show $0 cost as billing data is not reported. The 7-day moving average baseline will be established in future audits.
Cancellations & Failures
View Cancelled Runs (5)
Pattern: Smoke CI is cancelled 4 times in 24h — 3 instances logged 3–4 errors each. This recurring pattern may indicate a race condition, resource contention, or flaky test environment.
Deployment Incident Monitorcancelled without an engine assignment, suggesting it was stopped before agent initialization.Observability Insights
Three notable findings from cross-run analysis:
tool_result)Firewall Analysis
View Firewall Details (649 total requests)
ab.chatgpt.com:443,chatgpt.com:443The blocked ChatGPT domains are a consistent firewall block — workflows should not be attempting to reach these endpoints unless intentionally testing network restrictions. The DIFC Analyzer's high block rate is likely expected by design given its purpose of analyzing integrity-filtered events.
High-Cost & High-Token Runs
View Top Runs by Cost/Tokens
Sergo at 99 turns warrants attention — long interactive sessions with Serena (LSP-based Go analysis) can accumulate significant tokens. This appears to be a one-off extended session rather than a recurring cost driver.
DIFC Integrity-Filtered Events
1 filtered event detected:
github/pull_request_readonpr:github/gh-aw#28622— resource has lower integrity than the agent requires (integrity below "approved"). This is expected DIFC enforcement behavior.MCP Server Activity
No MCP failures recorded. All servers responded successfully.
Recommendations
ab.chatgpt.comorchatgpt.com. If none should, this may indicate a misconfigured tool or test.References:
Beta Was this translation helpful? Give feedback.
All reactions