What happened
On PR #742, the review agent approved at iteration 4 (SHA 39bc6cb). The author then pushed new commits that introduced undocumented behavioral changes to fullsend.yaml — removing auto-triage on issue open/edit and deleting the entire dispatch-prioritize job (55 lines). The review agent correctly escalated to request-changes in iteration 6, but its findings were presented as ordinary review feedback with no indication that this was a regression from a previously-approved state. The human reviewer (ralphbean) had to independently notice the scope creep. This is related to #849 (strategic fitness dimension).
What could go better
When the review agent has previously approved a PR and then reviews a new push, it should compare the new diff against the previously-approved diff and explicitly flag any changes that were not present in the approved version. This is especially important for changes that go beyond the PR's stated scope (issue title says 'rename commands' but the diff deletes entire jobs). Confidence: medium — the detection is straightforward (diff comparison), but determining whether new changes are 'in scope' requires judgment that may produce false positives on legitimate iterative PRs.
Proposed change
In the review agent definition or the pr-review skill, add awareness of prior review outcomes. The pre-review script already has access to prior reviews via the GitHub API. When the agent detects it previously approved the same PR, it should: (1) fetch the diff at the approved SHA, (2) compare it to the current diff, (3) highlight files or hunks that are new since approval, and (4) apply extra scrutiny to those changes — specifically checking whether they align with the PR description and originating issue. New deletions of entire code blocks or jobs should be flagged as potential scope expansion. This could be implemented as an additional step in pre-review.sh that writes a scope-delta.md file into the agent's working directory.
Validation criteria
On a future PR where the review agent approves and a subsequent push introduces changes outside the original scope, the review comment should explicitly call out 'these changes were introduced after a prior approval' and flag them for extra scrutiny. Measure: within the next 10 PRs that receive a post-approval push, the review agent should correctly identify scope-expanding changes in its review comment at least 80% of the time without significant false positives on legitimate refinements.
Generated by retro agent from #742
What happened
On PR #742, the review agent approved at iteration 4 (SHA
39bc6cb). The author then pushed new commits that introduced undocumented behavioral changes tofullsend.yaml— removing auto-triage on issue open/edit and deleting the entiredispatch-prioritizejob (55 lines). The review agent correctly escalated to request-changes in iteration 6, but its findings were presented as ordinary review feedback with no indication that this was a regression from a previously-approved state. The human reviewer (ralphbean) had to independently notice the scope creep. This is related to #849 (strategic fitness dimension).What could go better
When the review agent has previously approved a PR and then reviews a new push, it should compare the new diff against the previously-approved diff and explicitly flag any changes that were not present in the approved version. This is especially important for changes that go beyond the PR's stated scope (issue title says 'rename commands' but the diff deletes entire jobs). Confidence: medium — the detection is straightforward (diff comparison), but determining whether new changes are 'in scope' requires judgment that may produce false positives on legitimate iterative PRs.
Proposed change
In the review agent definition or the
pr-reviewskill, add awareness of prior review outcomes. The pre-review script already has access to prior reviews via the GitHub API. When the agent detects it previously approved the same PR, it should: (1) fetch the diff at the approved SHA, (2) compare it to the current diff, (3) highlight files or hunks that are new since approval, and (4) apply extra scrutiny to those changes — specifically checking whether they align with the PR description and originating issue. New deletions of entire code blocks or jobs should be flagged as potential scope expansion. This could be implemented as an additional step inpre-review.shthat writes ascope-delta.mdfile into the agent's working directory.Validation criteria
On a future PR where the review agent approves and a subsequent push introduces changes outside the original scope, the review comment should explicitly call out 'these changes were introduced after a prior approval' and flag them for extra scrutiny. Measure: within the next 10 PRs that receive a post-approval push, the review agent should correctly identify scope-expanding changes in its review comment at least 80% of the time without significant false positives on legitimate refinements.
Generated by retro agent from #742