[integrity] DIFC Integrity-Filtered Events Report — 2026-04-13 #26086
Closed
Replies: 1 comment
-
|
This discussion has been marked as outdated by Daily DIFC Integrity-Filtered Events Analyzer. A newer discussion is available at Discussion #26283. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Executive Summary
In the last 7 days, 263 DIFC integrity-filtered events were detected across 50 workflow runs spanning 16 distinct workflows. The most frequently filtered tool was
list_issues(150 events, 57%), followed bysearch_issues(55, 21%) andpull_request_read(37, 14%). Every single filtered event was caused by the same root cause: integrity_too_low — resources (issues, PRs, commits) authored by external contributors carry thenone:allintegrity tag, which falls below the agent's requiredapprovedthreshold.The volume spiked sharply on 2026-04-13 with 166 events (63% of the weekly total), primarily driven by Auto-Triage Issues (67 events) and the Dev workflow (32 events). There is no secrecy-related filtering whatsoever — this is entirely an integrity boundary issue where community-authored content is blocked from being processed by workflows that require "approved" integrity-level resources.
Key Metrics
integrity_too_low(100%)none:all(263 events)unapproved:all(9 events)📈 Events Over Time
The trend is strongly increasing, with a 2.7× jump from Apr 12 to Apr 13. This aligns with higher community PR/issue activity on weekdays (Apr 13 was a Sunday, Apr 12 Saturday — but the surge likely reflects a batch of community contributions arriving over the weekend being triaged by automated workflows on Monday morning). The low Apr 11 count (7 events) coincides with fewer community PRs on that day.
Charts uploaded as run artifacts for this workflow run (§24364571228).
🔧 Top Filtered Tools
list_issuessearch_issuespull_request_readlist_commitsissue_readlist_issuesdominates because it returns batches of issues at once — a singlelist_issuescall can surface many issues authored by community members withnone:allintegrity, producing multiple filtered events per call.search_issueshas the same amplification effect. This explains why workflows like Auto-Triage Issues and Dev accumulate high event counts quickly.🏷️ Filter Reasons and Tags
All 263 events share the single reason: "Resource has lower integrity than agent requires" — the agent threshold is
approvedbut all filtered resources carrynone:all(263 events) orunapproved:all(9 events). There are zero secrecy-related filtered events, confirming that information flow control is operating correctly in the secrecy dimension; only the integrity dimension is generating noise.📋 Per-Workflow Breakdown
📋 Per-Server Breakdown
All filtered events originate from the github MCP server. No other MCP server triggered integrity filtering during this period.
👥 Top 20 Issue/PR Authors Triggering Filtered Events
These are authors of the issues/PRs that workflows attempted to read but were blocked by the integrity gate:
Note: 37 events show "unknown" author (from
pull_request_readandlist_commitswhich don't expose an author login in the filtered event).🔍 Tuning Recommendations
1. High-volume triage workflows need integrity-aware filtering at the query level
Auto-Triage Issues(67 events) andDev(32 events) together account for 37.6% of all filtered events. Both workflows issuelist_issuesorsearch_issuescalls that return community-authored issues withnone:allintegrity. Recommendation: Add a pre-filter step that only passes issues withapprovedor higher integrity to the agent, or configure these workflows with a lower integrity threshold if community issue processing is intentional and safe.2.
Design Decision GatePR filtering is expected but could be optimised28 events from
Design Decision Gate 🏗️, each filtering exactly 1 PR per run (the Copilot-authored PR being evaluated). The gate correctly blocks reading the PR body/commits before integrity approval. Recommendation: This is working as designed — Copilot PRs arrive withnone:alluntil reviewed. No tuning needed, but consider explicitly documenting this as expected behaviour in the workflow definition.3.
Sub-Issue CloserandWeekly Issue Summarywarrant reviewSub-Issue Closer(22 events) andWeekly Issue Summary(21 events) show significant filtering. These workflows likely iterate over open issues without pre-filtering by integrity. Recommendation: Review whether these workflows actually need to process community-authored issues, or can be scoped toapprovedissues only to reduce noise and avoid integrity-gate failures.4.
Dependabot Dependency Checkercommit filtering (20 events)All 20 events are
list_commitscalls, likely reading Dependabot PR commits. Dependabot is a machine actor (gopherbotappears in the top users list with 15 events). Recommendation: Consider granting Dependabot-generated content anapprovedintegrity label via a dedicated bot-trust rule, since Dependabot commits are deterministically generated and low-risk.5. Consider
unapproved:alltag escalation path9 events involve the
unapproved:allsecondary integrity tag. These represent resources that have been explicitly tagged as unapproved (rather than simply untagged). Recommendation: Audit which resources carry this tag and whether a human review workflow should be triggered to escalate them toapproved.6. Apr 13 spike — Monitor for recurrence
The 2.7× spike on Apr 13 (166 events vs 62 on Apr 12) should be monitored. If a similar spike occurs next Sunday/Monday, it confirms a weekly batch-processing pattern. Consider rate-limiting automated triage workflows during low-activity windows to spread the load.
References:
Beta Was this translation helpful? Give feedback.
All reactions