📊 Agentic Workflow Lock File Statistics - October 28, 2025 #2657
Closed
Replies: 1 comment
-
|
This discussion was automatically closed because it was created by an agentic workflow more than 1 month ago. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
📊 Agentic Workflow Lock File Statistics - October 28, 2025
This analysis examines all 59
.lock.ymlfiles in thegithubnext/gh-awrepository to identify usage patterns, structural characteristics, and best practices across agentic workflows.Executive Summary
The repository contains 59 agentic workflow lock files totaling approximately 11.5 MB of workflow definitions. Most workflows (54%) exceed 200 KB in size, indicating rich, comprehensive agent configurations. The dominant trigger combination is
workflow_dispatch + schedule + issues + pull_request(30%), showing workflows designed for both manual and automated execution across multiple GitHub event types.Key Findings:
create-pull-request(68 instances) being the most popularFull Report Details
File Size Distribution
File Size Statistics:
.github/workflows/shared/opencode.lock.yml(23 KB) - shared configuration fragment.github/workflows/poem-bot.lock.yml(361 KB) - complex creative content generator.github/workflows/q.lock.yml(292 KB) - question answering workflow.github/workflows/unbloat-docs.lock.yml(273 KB) - documentation optimizerSize by Workflow Category:
Trigger Analysis
Trigger Type Distribution
Most Common Trigger Combinations
workflow_dispatch + schedule + issues + pull_requestworkflow_dispatch + schedule + pull_requestworkflow_dispatch + issues + pull_requestissues + pull_requestworkflow_dispatchonlyworkflow_dispatch + pull_requestworkflow_dispatch + issues + pull_request + pushworkflow_dispatch + issuesInsight: The prevalence of
workflow_dispatch(81%) indicates a strong preference for manual control and testing capability, even in automated workflows.Schedule Patterns
29 workflows use cron schedules for periodic execution. Common patterns:
0 0,6,12,18 * * *0/10 * * * *0 6 * * 00 2 * * 1-50 0 * * *0 9 * * 1-50 9 * * 10 18 * * 1Notable Patterns:
Safe Outputs Analysis
Safe outputs are a critical security feature that allows agentic workflows to produce outputs without requiring write permissions to the repository code. The analysis shows 259 safe output declarations across all workflows.
Safe Output Types Distribution
Key Observations:
Safe Output Combinations
Many workflows use multiple safe output types to provide flexible response options:
Most Common Combinations:
create-discussion + create-issue + add-comment + create-pull-request(19 workflows) - Full flexibilitycreate-discussion + create-issue + add-comment(12 workflows) - Read-only orientedcreate-issue + add-comment(8 workflows) - Issue-focusedDiscussion Categories
Discussion categories are not consistently extracted from the lock files in this analysis, suggesting they may be dynamically determined or configured elsewhere. Manual inspection of specific workflows would be needed for category distribution.
Structural Characteristics
Job and Step Complexity
poem-bot.lock.ymlNote: Job counting requires refinement as current analysis shows 0 jobs per workflow. Lock files likely use a different job structure than standard GitHub Actions workflows. Further investigation needed.
Timeout Patterns
Workflow step timeouts show a clear pattern of short, bounded execution times:
Key Insights:
Permission Patterns
Security Observation: The overwhelming majority (91.5%) of workflows use explicit permission declarations rather than broad
read-allorwrite-allpermissions, demonstrating strong security practices.The workflows with
read-allpermissions:ci-doctor.lock.yml(2 occurrences)copilot-agent-analysis.lock.yml(2 occurrences)daily-news.lock.yml(2 occurrences)smoke-detector.lock.yml(2 occurrences)technical-doc-writer.lock.yml(2 occurrences)These appear to be analysis and reporting workflows that need broad read access to repository data.
Concurrency Patterns
Most workflows use concurrency groups to prevent multiple simultaneous runs:
Common Patterns:
group: "gh-aw-${{ github.workflow }}"- Standard pattern for agentic workflowsgroup: "gh-aw-copilot-${{ github.workflow }}"- Copilot-specific workflowsgroup: "gh-aw-claude-${{ github.workflow }}"- Claude-specific workflowsThis ensures that each workflow type runs serially, preventing resource conflicts and duplicate work.
Tool & MCP Patterns
Engine Distribution
Analysis of engine references across lock files:
Observations:
MCP Server Usage
MCP (Model Context Protocol) server extraction requires refinement. Initial analysis shows MCP configurations are present but specific server names are not consistently captured. Manual inspection suggests common servers include:
Further analysis needed for detailed MCP server statistics.
Workflow Categorization
By Naming Pattern
daily-*- Scheduled daily tasks (news, reports, improvements)smoke-*- Testing different engines (claude, copilot, codex, opencode)test-*- Integration and feature tests*.firewall.*- Security-enhanced variantsBy Function
Analysis & Auditing (13 workflows):
audit-workflows.lock.yml,blog-auditor.lock.yml,lockfile-stats.lock.yml,safe-output-health.lock.yml,commit-changes-analyzer.lock.yml,copilot-agent-analysis.lock.yml,example-workflow-analyzer.lock.yml,artifacts-summary.lock.yml, etc.Code Quality & Improvement (12 workflows):
ci-doctor.lock.yml,daily-test-improver.lock.yml,daily-perf-improver.lock.yml,duplicate-code-detector.lock.yml,semantic-function-refactor.lock.yml,go-pattern-detector.lock.yml,go-logger.lock.yml,tidy.lock.yml, etc.Documentation (6 workflows):
technical-doc-writer.lock.yml,unbloat-docs.lock.yml,daily-doc-updater.lock.yml,instructions-janitor.lock.yml,repo-tree-map.lock.yml,video-analyzer.lock.ymlIssue & PR Management (8 workflows):
issue-classifier.lock.yml,mergefest.lock.yml,plan.lock.yml,security-fix-pr.lock.yml,changeset-generator.firewall.lock.ymlReporting & Summaries (7 workflows):
daily-news.lock.yml,daily-repo-chronicle.lock.yml,weekly-issue-summary.lock.yml,notion-issue-summary.lock.yml,daily-firewall-report.lock.yml,github-mcp-tools-report.lock.ymlResearch & Development (5 workflows):
research.lock.yml,scout.lock.yml,dev.lock.yml,dev-hawk.lock.yml,q.lock.ymlSpecialized Tools (8 workflows):
poem-bot.lock.yml,pdf-summary.lock.yml,mcp-inspector.lock.yml,brave.lock.yml,dictation-prompt.lock.yml,schema-consistency-checker.lock.yml,cli-version-checker.lock.ymlInteresting Findings
Uniform Large Size: 86% of workflows exceed 100 KB, suggesting the lock file format includes substantial boilerplate or comprehensive configuration. This could indicate opportunities for:
Pull Request Focus: With 86% of workflows responding to pull requests, this repository heavily emphasizes code review and PR-based workflows, making it ideal for:
Safe Output Adoption: The consistent use of safe outputs (259 declarations) across workflows demonstrates mature security practices. The balanced distribution suggests workflows are designed to output in whatever format suits the context best.
Trigger Versatility: 30% of workflows support all four major trigger types (workflow_dispatch, schedule, issues, pull_request), showing a "Swiss Army knife" approach where workflows can handle multiple activation patterns.
Conservative Timeouts: 93% of steps complete within 20 minutes, with the 10-minute timeout being most common. This suggests:
Named Workflow Patterns: The repository shows clear organizational patterns with prefixes like
daily-,smoke-, and suffixes like.firewall., making workflows discoverable and their purpose immediately clear.The "Poem Bot" Anomaly: The largest workflow at 361 KB (
poem-bot.lock.yml) is significantly larger than average and includes 101 steps - the most in any workflow. This suggests complex creative content generation requires more elaborate orchestration.Minimal Push Triggers: Only 2 workflows (3.4%) use push triggers, showing intentional design to avoid continuous execution on every commit. This conserves resources and reduces noise.
High-Frequency Monitoring: 5 workflows run every 6 hours, and 3 run every 10 minutes, indicating active monitoring and rapid response capabilities for critical workflows.
Shared Configurations: The presence of
.github/workflows/shared/with small lock files (23-81 KB) suggests a pattern of configuration composition and reuse across workflows.Recommendations
Based on this analysis, here are recommendations for optimizing and improving agentic workflows in this repository:
1. Configuration Optimization
shared/directory pattern shows promise - consider more shared workflow fragments2. Trigger Strategy
3. Safe Output Consistency
4. Performance & Timeouts
5. Security & Permissions
read-allpermissions should be reviewed to ensure they truly need broad access.firewallvariants for sensitive operations6. Monitoring & Observability
safe-output-health.lock.ymlworkflow is valuable - ensure it runs regularlyaudit-workflows.lock.ymlandlockfile-stats.lock.yml7. Documentation
daily-,smoke-,test-, and.firewall.naming conventions8. Testing
9. Schedule Optimization
10. Future Analysis
Methodology
Tools Used:
grep,awk,sedfor text processing and pattern matchingstatfor file size analysis/tmp/gh-aw/cache-memory/scripts/Data Sources:
.lock.ymlfiles in.github/workflows/and.github/workflows/shared/Limitations:
Reproducibility:
/tmp/gh-aw/cache-memory/scripts//tmp/gh-aw/cache-memory/data/last_analysis_date.txt/tmp/gh-aw/cache-memory/data/Future Improvements:
Generated by Lockfile Statistics Analysis Agent on 2025-10-28
Repository: githubnext/gh-aw
Analysis Run: §18863056700
Lockfiles Analyzed: 59
Total Size: ~11.5 MB
Beta Was this translation helpful? Give feedback.
All reactions