github-agentic-workflows
GitHub Agentic Workflows
Procedures
Step 1: Identify the repository state
- Inspect the workspace for
.github/workflows/,.github/agents/, existing.lock.ymlfiles, and anygh awusage. - Execute
node skills/github-agentic-workflows/scripts/find-gh-aw-targets.mjs .when a Node runtime is available. - Run
gh aw versionbefore making compiler-sensitive decisions so the workflow authoring path matches the installed CLI behavior. - If the repository contains multiple candidate workflows, prefer the workflow the user named or the one closest to the active issue, pull request, or automation surface.
- If the repository has no GH-AW setup and the task is to create or maintain agentic workflows, read
references/authoring.mdbefore editing. - If the task is limited to standard deterministic GitHub Actions YAML without agentic markdown workflows, stop and explain that this skill does not apply.
Step 2: Choose the working mode
- Classify the task as one of: repository setup, new workflow authoring, workflow revision, workflow installation from another repository, security review, or failure debugging.
- Read
references/examples.mdwhen the task needs a starting pattern for scheduled reports, issue or PR triage, orchestration, or agent handoff. - Read
references/security-and-operations.mdwhen the workflow needs safe outputs, network policy, authentication, lockdown, threat detection, or run observability. - Read
references/troubleshooting.mdwhen the workflow fails to compile, install, authenticate, execute safe outputs, or access tools.
Step 3: Author or revise the workflow source
- Keep the workflow source of truth in
.github/workflows/<workflow-name>.md. - Use
assets/workflow.template.mdas the base shape when creating a new workflow. - Choose the smallest viable trigger surface and repository role scope that satisfies the task.
- Keep
permissions:read-only unless the workflow truly needs broader GitHub Actions permissions outside the agentic section. - Prefer
safe-outputs:for comments, issues, labels, PRs, agent assignment, and orchestration instead of granting direct write access to the agent. - In safe-output workflows, instruct the agent to call
noopwhen no action is required. - Keep
tools:andtoolsets:minimal and specific to the task. - Default to
engine: copilotunless the task explicitly requires another engine and the repository is already prepared for that engine's authentication model. - Configure
network:with least privilege. Prefer ecosystem identifiers such asnode,python, orgithubover individual registry domains when the compiler supports them. - If strict mode and the installed CLI reject custom domains that the workflow still needs, prefetch external sources in deterministic setup steps and pass local files into the agent instead of broadly relaxing the firewall.
- Do not rely on
${{ steps.<id>.outputs.* }}placeholders reaching the agent-visible markdown body in real runs. If prompt instructions depend on runtime values, write them into a deterministic local file during setup and tell the agent to read that file. - Use imported or reusable workflows only when the repository genuinely benefits from shared logic or orchestration.
- For recurring work across a dynamic set of inputs, prefer a reusable GH-AW worker plus a deterministic YAML wrapper for discovery and matrix fan-out.
- When a reusable GH-AW worker is called from a matrix, do not leave it on the default shared workflow-level concurrency group. Set an explicit concurrency group keyed by the matrix input or prompt identity so parallel legs are not cancelled by GitHub's one-running-one-pending concurrency behavior.
- Recompile the workflow after frontmatter, imports, or other compile-time configuration changes.
- If only the markdown body changed and the workflow is edited directly on GitHub.com, do not recompile solely for body text changes.
- Treat
.github/aw/as transient GH-AW runtime and compiler scratch space during local compile, validate, or trial flows unless the workflow intentionally uses checked-in files from that path.
Step 4: Configure repository prerequisites and authentication
- Read
references/authoring.mdbefore first-time repository setup. - Run
gh aw initwhen the repository is not configured for GH-AW authoring and the user wants persistent setup. - Configure engine secrets with
gh aw secrets bootstraporgh aw secrets set. - Use
COPILOT_GITHUB_TOKENfor Copilot engine authentication. - For Copilot runs, use a fine-grained PAT in
COPILOT_GITHUB_TOKEN; a generalgho_...OAuth token may pass secret checks but still fail real Copilot execution. - When using
gh aw trial, verify that the host repository also has the required engine secret. Secrets from the logical or source repository are not copied automatically into the temporary or reusable host repo. - Re-check
gh aw versionafter extension upgrades or reinstall paths so the repository guidance and compiler behavior stay aligned. - If a deterministic wrapper calls a reusable worker, make the caller workflow permissions at least as broad as the nested worker's requested
actions,contents, andpull-requestsscopes or the run can fail before agent execution starts. - Use a GitHub App or custom GitHub token when the workflow needs cross-repository reads or writes, Projects access, remote GitHub tool mode, or advanced safe outputs.
- If the repository is public and the workflow will inspect untrusted external content, preserve lockdown and approval controls unless the task is explicitly a low-risk public workflow.
Step 5: Validate, compile, and execute
- Run
gh aw fix --writewhen the workflow uses deprecated fields or the compiler points to codemod-able drift. - Run
gh aw validate --strictbefore treating a workflow as ready. - When the CLI version changed or a workflow depends on newer frontmatter behavior, run
gh aw compile --verboseso warnings and generated-version changes are visible. - Run
gh aw compileafter validation succeeds and commit both the.mdsource and the generated.lock.ymlfile. - Use
gh aw run <workflow> --dry-runto validate remote dispatch behavior, especially when you suspect branch, trigger, or workflow-discovery problems. - Use
gh aw trial ./.github/workflows/<workflow>.mdwhen you need to execute a local workflow source before pushing it. The explicit./path matters; without it, the CLI may parse the argument as a repository spec instead of a local file. - Use
gh aw run <workflow>for direct execution only after the workflow source or lockfile actually exists on the target branch. - Use
gh aw status,gh aw logs,gh aw audit, andgh aw healthto review state, failures, cost, tool usage, and success trends after changes.
Step 6: Operate and improve professionally
- Review whether the workflow can be simplified, split into smaller workflows, or converted into shared components.
- Prefer staged safe outputs for initial rollout of workflows that create issues, comments, or pull requests at scale.
- For recurring maintenance, pin or review the installed
gh-awversion deliberately and update workflows throughgh aw updateorgh aw upgradeinstead of ad hoc copy-paste. - Keep workflow prompts specific, bounded, and auditable. Move broad strategy into reusable imports or agent files when multiple workflows need the same rules.
Error Handling
- If
gh extension install github/gh-awfails, use the standalone installer path documented inreferences/troubleshooting.md. - If compilation fails, fix frontmatter syntax, deprecated fields, imports, or permission mismatches before continuing.
- If compiler behavior does not match the docs you are reading, trust the installed
gh aw versionand validate against that version before rewriting the workflow shape. - If
gh aw trialrejects.github/workflows/<name>.mdas an invalid repository spec, retry with an explicit local path such as./.github/workflows/<name>.md. - If a reusable worker succeeds in isolation but the wrapper run fails at startup, inspect caller-workflow
permissions:inheritance before changing the worker logic. - If a matrix of reusable GH-AW workers cancels most legs immediately, inspect the called workflow's concurrency group first. A shared workflow-level group will cancel pending legs even when
cancel-in-progressisfalse. - If a trial run fails on the activation step with
Validate COPILOT_GITHUB_TOKEN secret, inspect the host repository withgh secret list -R <host-repo>. The source repository's secrets are not inherited by the trial host. - If
gh aw trial --force-delete-host-repo-beforefails, confirm you have admin rights on the host repository and that the current GitHub auth token includesdelete_reposcope. - If the workflow prompt still shows unresolved runtime placeholders during execution, move those values into a generated local context file and have the agent read that file explicitly.
- If local
gh aw compile,gh aw validate, orgh aw trialcommands create.github/aw/files such asactions-lock.jsonor logs, treat them as transient byproducts and remove them before commit unless the repository intentionally keeps them. - If safe outputs do nothing, verify that staged mode is intentional and that the prompt explicitly instructs the agent to call
noopwhen no write action is needed. - If
gh aw mcp inspectfails on a compiled scheduled workflow source with a fuzzy schedule parsing error, treat that as an inspection-path limitation first. Re-rungh aw compile, prefer installed-workflow or run-log based debugging, and do not assume the workflow itself is invalid if validation and compile already passed. - If the compiler rejects engine fields or tool entries that look valid from older examples, trust the installed schema. In
gh aw v0.58.3,engine.max-turnsis not supported for Copilot,bashmust betrue,false, or an allowlist, and bareedit:/web-fetch:keys are accepted where boolean values are not. - If URLs are sanitized as
(redacted)or tools cannot reach required services, tighten and expandnetwork.alloweddeliberately rather than disabling the firewall. - If Copilot inference fails with a configured token, verify that the PAT owner actually has Copilot license and inference access.
- If public-repository workflows miss external contributor content, confirm whether GitHub lockdown mode is blocking that content before changing workflow logic.
More from webmaxru/ai-native-dev
skill-creator
Authors and structures professional-grade agent skills following the agentskills.io spec. Use when creating new skill directories, drafting procedural instructions, or optimizing metadata for discoverability. Don't use for general documentation, non-agentic library code, or README files.
88agent-skill-deploy
>
88agent-package-manager
Installs, configures, audits, and operates Agent Package Manager (APM) in repositories. Use when initializing apm.yml, installing or updating packages, validating manifests, managing lockfiles, compiling agent context, browsing MCP servers, setting up runtimes, or packaging resolved context for CI and team distribution. Don't use for writing a single skill by hand, generic package managers like npm or pip, or non-APM agent configuration systems.
88