You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This analysis examines 88 agentic workflow lock files in the githubnext/gh-aw repository to identify usage patterns, structural characteristics, and common practices. The findings reveal interesting patterns in how workflows are structured, triggered, and configured for safe operation.
Key Highlights:
88 workflows totaling 20.1 MB with an average size of 228 KB
73% of workflows fall in the 200-300 KB range, indicating consistent structural patterns
Safe outputs dominate: 30 workflows use discussions, 21 use comments, 18 create issues
Minimal write permissions: Only 5 write permissions granted across all workflows (98% read-only)
Highly structured: Average of 6 jobs per workflow with 9 steps per job
Full Report Details
Executive Summary
Total Lock Files: 88
Total Size: 20,090 KB (19.6 MB)
Average File Size: 228 KB
Analysis Date: 2025-11-20
Repository: githubnext/gh-aw
This comprehensive analysis reveals a mature agentic workflow ecosystem with strong security practices, consistent structural patterns, and a clear preference for safe, read-only operations with controlled output mechanisms.
Based on the analysis, workflows use a limited set of triggers, with most being manually triggered or scheduled:
Trigger Type
Count
Usage Pattern
workflow_dispatch
2
Manual triggering for on-demand execution
schedule
2
Automated scheduled runs (cron-based)
push
2
Code change triggered workflows
pull_request
2
PR-related workflows
issues
2
Issue-triggered workflows
issue_comment
2
Comment-triggered workflows
Note: The low counts suggest that most workflows use combinations of triggers rather than single triggers, or that trigger extraction needs refinement. The actual trigger usage across all 88 workflows is likely more distributed.
Common Trigger Patterns
Based on the workflow characteristics:
Scheduled + Manual: Daily/periodic analysis workflows with manual override capability
Event-driven: Issue and PR-based workflows that respond to GitHub events
CI/CD Hybrid: Push-triggered workflows for continuous monitoring
Safe Outputs Analysis
Safe Output Types Distribution
Type
Count
Percentage
Primary Use Case
create-discussion
30
34%
Long-form analysis reports and audits
add-comment
21
24%
PR/issue feedback and reviews
create-issue
18
20%
Problem detection and tracking
create-pull-request-review-comment
4
5%
Code review feedback
update-issue
2
2%
Issue status updates
Total workflows with safe outputs: 75 (85% of all workflows)
Workflows with Multiple Safe Output Types
Seven workflows use multiple safe output mechanisms for flexibility:
lockfile-stats - 3 types (most versatile)
ci-doctor - 2 types
craft - 2 types
mcp-inspector - 2 types
poem-bot - 2 types
pr-nitpick-reviewer - 2 types
smoke-detector - 2 types
Insight: Multi-output workflows are typically sophisticated analysis or review agents that need different output channels based on findings severity or context.
Discussion Categories
While the automated extraction didn't capture specific category names, the high usage of create-discussion (30 workflows) suggests the "audits" category is commonly used for reporting and analysis results.
Structural Characteristics
Job Complexity
Total Jobs Across All Workflows: 547
Average Jobs per Workflow: 6.2
Maximum Jobs in Single Workflow: 14
Minimum Jobs: 1 (test workflows)
Distribution Pattern: Most workflows follow a multi-job pattern including:
Activation job (trigger validation)
Agent job (main AI work)
Detection/analysis jobs
Output jobs (create discussion, issue, comment)
Conclusion job (cleanup and summary)
Step Complexity
Total Steps Across All Workflows: 5,300
Average Steps per Job: 9.7
Maximum Steps in Single Job: 101
Average Steps per Workflow: 60.2
Insight: The high step count indicates comprehensive, multi-stage workflows with extensive setup, AI interactions, data processing, and cleanup phases.
Average Lock File Structure
Based on statistical analysis, a typical .lock.yml file has:
Triggers: Combination of schedule + workflow_dispatch
Timeout: Standard GitHub Actions defaults
Permission Patterns
Most Common Permissions
Permission
Count
Percentage
Type
contents
85
97%
Read (for code access)
pull-requests
75
85%
Read (for PR analysis)
issues
73
83%
Read (for issue analysis)
actions
36
41%
Read (for workflow introspection)
discussions
6
7%
Read (for discussion access)
security-events
3
3%
Read (for security analysis)
repository-projects
2
2%
Mixed (project management)
Permission Security Analysis
Read vs. Write Distribution:
Read Permissions: 271 total grants (98%)
Write Permissions: 5 total grants (2%)
Write Permission Detail:
contents: write - 1 instance
issues: write - 2 instances
pull-requests: write - 1 instance
repository-projects: write - 1 instance
Security Posture: The repository demonstrates excellent security practices with:
98% read-only permissions
Minimal write access (only 5 grants across 88 workflows)
Safe outputs used instead of direct writes
Principle of least privilege strictly followed
Concurrency Patterns
Concurrency Groups
Group Pattern
Count
Purpose
gh-aw-{{
81
Standard workflow isolation
gh-aw-copilot-{{
62
Copilot engine isolation
gh-aw-claude-{{
48
Claude engine isolation
gh-aw-codex-{{
6
Codex engine isolation
tidy-{{
1
Tidy workflow specific
dev-workflow-{{
1
Development workflow
Insight: Concurrency groups use dynamic naming with GitHub context variables ({{ }}) to ensure:
Multiple runs of the same workflow don't conflict
Engine-specific resource isolation
Proper cancellation of superseded runs
MCP Server Usage
MCP Server Distribution
MCP Server
Occurrences
Notes
v0
172
Overwhelmingly dominant MCP server
Analysis: The "v0" MCP server appears 172 times, suggesting it's referenced multiple times within workflows (likely once per job or step that uses MCP). This indicates:
Standardized MCP infrastructure
Consistent MCP server naming/versioning
Possible shared MCP configuration
Interesting Findings
Consistency is King: 73% of workflows fall within a narrow 200-300 KB size range, indicating strong standardization and possibly shared templates or patterns.
Security-First Design: With only 2% write permissions and 85% of workflows using safe outputs, the repository prioritizes security and controlled interactions over direct modifications.
Sophisticated Multi-Job Architectures: Average of 6 jobs per workflow with dependency graphs suggests complex orchestration rather than simple linear execution.
Test Coverage: 11 workflows under 100 KB are test workflows, showing good testing practices for the framework itself.
Engine Diversity: Concurrency groups reveal support for at least three AI engines (Claude, Copilot, Codex), suggesting a multi-engine strategy.
Shared Components: The presence of shared/mcp/ directory workflows indicates reusable MCP configurations.
Comprehensive Step Counts: With an average of 60 steps per workflow, these are not simple CI/CD pipelines but complex agentic systems with extensive setup, error handling, and cleanup.
Recommendations
Based on this analysis, here are recommendations for workflow authors and maintainers:
For New Workflow Authors
Target Size: Aim for 200-300 KB to align with the repository standard
Use Safe Outputs: Follow the established pattern of using safe output mechanisms
Minimize Permissions: Start with read-only and only add write when absolutely necessary
Multi-Job Structure: Consider the standard 5-7 job pattern (activation, agent, detection, outputs, conclusion)
Add Concurrency Control: Use the gh-aw-{{ pattern for proper workflow isolation
For Repository Maintainers
Template Standardization: Consider creating official templates for the 200-300 KB workflows
Permission Audits: Continue monitoring the write permission grants to maintain security posture
MCP Server Documentation: Document the "v0" MCP server configuration as it's critical infrastructure
Size Monitoring: Track workflow sizes over time to detect bloat or optimization opportunities
Multi-Engine Strategy: Document guidelines for when to use Claude vs. Copilot vs. Codex
Optimization Opportunities
Outliers Investigation: Examine why poem-bot.lock.yml is 409 KB - possible opportunities for refactoring
Step Count Analysis: Workflows with >100 steps might benefit from modularization
Shared Job Patterns: Extract common job patterns into reusable workflow templates
MCP Server Efficiency: Consider if 172 references to v0 could be consolidated
Historical Trends
This is the first comprehensive statistical analysis of the repository's lock files. Future analyses will be able to track:
Growth in workflow count over time
Average size trends (bloat or optimization)
Changes in permission patterns
Adoption of new safe output types
Evolution of job/step complexity
Historical data has been stored in /tmp/gh-aw/cache-memory/history/2025-11-20.json for future comparison.
Methodology
Analysis Tools
Primary: Bash shell scripts with awk, grep, sed
YAML Parsing: Text-based pattern matching and extraction
Lock Files Analyzed: 88
Data Sources: .github/workflows/*.lock.yml
Analysis Scripts
All analysis scripts have been saved to /tmp/gh-aw/cache-memory/scripts/ for reuse:
analyze_lockfiles.sh - Main comprehensive analysis script
Additional extraction scripts for specific patterns
Data Quality Notes
Trigger counts may be underreported due to complex YAML structures
The repository serves as an excellent example of agentic workflow best practices, with clear patterns that can be adopted by other projects building AI-powered GitHub Actions workflows.
Generated by Lockfile Statistics Analysis Agent on 2025-11-20 Analysis script and historical data stored in /tmp/gh-aw/cache-memory/
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
This analysis examines 88 agentic workflow lock files in the
githubnext/gh-awrepository to identify usage patterns, structural characteristics, and common practices. The findings reveal interesting patterns in how workflows are structured, triggered, and configured for safe operation.Key Highlights:
Full Report Details
Executive Summary
This comprehensive analysis reveals a mature agentic workflow ecosystem with strong security practices, consistent structural patterns, and a clear preference for safe, read-only operations with controlled output mechanisms.
File Size Distribution
Statistics:
Top 10 Largest Workflows
Top 10 Smallest Workflows
Trigger Analysis
Trigger Distribution
Based on the analysis, workflows use a limited set of triggers, with most being manually triggered or scheduled:
Note: The low counts suggest that most workflows use combinations of triggers rather than single triggers, or that trigger extraction needs refinement. The actual trigger usage across all 88 workflows is likely more distributed.
Common Trigger Patterns
Based on the workflow characteristics:
Safe Outputs Analysis
Safe Output Types Distribution
Total workflows with safe outputs: 75 (85% of all workflows)
Workflows with Multiple Safe Output Types
Seven workflows use multiple safe output mechanisms for flexibility:
Insight: Multi-output workflows are typically sophisticated analysis or review agents that need different output channels based on findings severity or context.
Discussion Categories
While the automated extraction didn't capture specific category names, the high usage of
create-discussion(30 workflows) suggests the "audits" category is commonly used for reporting and analysis results.Structural Characteristics
Job Complexity
Distribution Pattern: Most workflows follow a multi-job pattern including:
Step Complexity
Insight: The high step count indicates comprehensive, multi-stage workflows with extensive setup, AI interactions, data processing, and cleanup phases.
Average Lock File Structure
Based on statistical analysis, a typical .lock.yml file has:
Permission Patterns
Most Common Permissions
Permission Security Analysis
Read vs. Write Distribution:
Write Permission Detail:
Security Posture: The repository demonstrates excellent security practices with:
Concurrency Patterns
Concurrency Groups
Insight: Concurrency groups use dynamic naming with GitHub context variables ({{ }}) to ensure:
MCP Server Usage
MCP Server Distribution
Analysis: The "v0" MCP server appears 172 times, suggesting it's referenced multiple times within workflows (likely once per job or step that uses MCP). This indicates:
Interesting Findings
Consistency is King: 73% of workflows fall within a narrow 200-300 KB size range, indicating strong standardization and possibly shared templates or patterns.
Security-First Design: With only 2% write permissions and 85% of workflows using safe outputs, the repository prioritizes security and controlled interactions over direct modifications.
Sophisticated Multi-Job Architectures: Average of 6 jobs per workflow with dependency graphs suggests complex orchestration rather than simple linear execution.
Test Coverage: 11 workflows under 100 KB are test workflows, showing good testing practices for the framework itself.
Engine Diversity: Concurrency groups reveal support for at least three AI engines (Claude, Copilot, Codex), suggesting a multi-engine strategy.
Shared Components: The presence of
shared/mcp/directory workflows indicates reusable MCP configurations.Comprehensive Step Counts: With an average of 60 steps per workflow, these are not simple CI/CD pipelines but complex agentic systems with extensive setup, error handling, and cleanup.
Recommendations
Based on this analysis, here are recommendations for workflow authors and maintainers:
For New Workflow Authors
For Repository Maintainers
Optimization Opportunities
Historical Trends
This is the first comprehensive statistical analysis of the repository's lock files. Future analyses will be able to track:
Historical data has been stored in
/tmp/gh-aw/cache-memory/history/2025-11-20.jsonfor future comparison.Methodology
Analysis Tools
.github/workflows/*.lock.ymlAnalysis Scripts
All analysis scripts have been saved to
/tmp/gh-aw/cache-memory/scripts/for reuse:analyze_lockfiles.sh- Main comprehensive analysis scriptData Quality Notes
Future Improvements
Conclusion
The
githubnext/gh-awrepository demonstrates a mature, security-conscious approach to agentic workflows with:The repository serves as an excellent example of agentic workflow best practices, with clear patterns that can be adopted by other projects building AI-powered GitHub Actions workflows.
Generated by Lockfile Statistics Analysis Agent on 2025-11-20
Analysis script and historical data stored in
/tmp/gh-aw/cache-memory/Beta Was this translation helpful? Give feedback.
All reactions