[copilot-cli-research] Copilot CLI Deep Research - February 2026 #14533
Closed
Replies: 1 comment
-
|
This discussion was automatically closed because it expired on 2026-02-15T15:27:59.252Z.
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Executive Summary
Analysis Date: February 8, 2026
Repository: github/gh-aw
Scope: 208 total workflows, 71 using Copilot engine (34% adoption)
This comprehensive research identifies 15+ optimization opportunities across security, performance, and feature adoption. Key finding: While Copilot CLI is widely adopted, many advanced features remain underutilized, with security features showing particularly low adoption (17% firewall usage).
Key Findings:
Primary Recommendation: Implement security-focused workflow auditing and increase firewall adoption from 17% to >80% for workflows handling untrusted input.
Critical Findings
🔴 High Priority Security Issues
Low Firewall Adoption - Only 12 of 71 workflows (17%) use network firewall
issues,pull_request, orworkflow_dispatchtriggersOverly Permissive Toolsets - 3 workflows use
toolsets: [all][repos, issues, pull_requests]instead of[all]Unrestricted Shell Access - 13 workflows use
bash: truebash: ["jq *", "git *"]or wildcardbash: [":*"]🟡 Medium Priority Opportunities
Zero Plugin Adoption - No workflows use Copilot CLI plugins
Limited Custom Agents - Only 1 workflow uses
engine.agentSuboptimal Model Selection - Only 11 workflows customize model
gpt-5-minifor quick tasks,gpt-5.1-codexfor code generation1️⃣ Current State Analysis
View Copilot CLI Capabilities Inventory
Available CLI Flags
--share--add-dir--agent--disable-builtin-mcps--allow-tool--allow-all-toolsbash: [":*"]--allow-all-pathsedittool--log-levelall--log-dir/tmp/gh-aw/sandbox/agent/logs/--modelAvailable Engine Configuration
engine.idengine.versionengine.modelengine.argsengine.envengine.agentengine.commandengine.max-turnsSecurity Features Available
Tool Ecosystem
Well Adopted:
Underutilized:
View Timeout Distribution Analysis
Timeout Distribution
Key Insights:
Recommendations:
View GitHub Toolsets Usage Patterns
GitHub Toolsets Distribution
[default][default, discussions][default, actions][pull_requests, repos][repos, pull_requests][all]Security Concerns:
[all]: Should specify exact toolsets neededBest Practices:
2️⃣ Feature Usage Matrix
Key Takeaways:
3️⃣ Missed Opportunities
View High Priority Opportunities
🔴 High Priority
Opportunity 1: Increase Network Firewall Adoption
network.firewallissues,pull_request,workflow_dispatch, or processing external dataOpportunity 2: Replace Generic GitHub Toolsets
toolsets: [all]granting excessive GitHub API permissionsOpportunity 3: Restrict Bash Tool Permissions
bash: trueallowing unrestricted shell accessOpportunity 4: Audit Workflows Without Network Config
network:configurationView Medium Priority Opportunities
🟡 Medium Priority
Opportunity 5: Establish Plugin Ecosystem
Opportunity 6: Create Custom Agent Templates
engine.agentfor custom agent filessecurity-reviewer.agent.md- Security-focused reviewstest-generator.agent.md- Test creationrefactoring-expert.agent.md- Code refactoringdocumentation-writer.agent.md- Technical docsperformance-optimizer.agent.md- Performance workOpportunity 7: Optimize Model Selection for Cost
gpt-5-minigpt-5.1-codex,gpt-5.2-codexclaude-sonnet-4,gpt-5.1-codexgpt-5,claude-opus-4Opportunity 8: Review High-Timeout Workflows
steps:Opportunity 9: Increase SRT Sandbox Adoption
View Low Priority Opportunities
🟢 Low Priority
Opportunity 10: Version Pinning for Stability
Opportunity 11: Leverage Custom CLI Args
engine.argsOpportunity 12: Increase Network Allowlist Specificity
4️⃣ Specific Workflow Recommendations
View Workflow-Specific Recommendations
Workflows Using
toolsets: [all](3 workflows)Action Required: Replace with specific toolsets
Example Fix:
Workflows Using
bash: true(13 workflows)Action Required: Specify commands or use wildcard
Example Fix:
Workflows with 60+ Minute Timeouts (4 workflows)
Action Required: Review and optimize
Checklist:
Example:
Workflows Without Network Config (4 workflows)
Action Required: Add network allowlist
Example Fix:
Workflows Without Firewall (59 of 71)
Action Required: Audit for untrusted input and add firewall
When to Add Firewall:
issues,pull_request,workflow_dispatchExample Fix:
5️⃣ Best Practice Guidelines
Based on this research, here are recommended best practices for Copilot CLI workflows:
Security Best Practices
Always specify GitHub toolsets - Never use
[all], use specific toolsets like[repos, issues, pull_requests]Restrict bash access - Use specific commands or explicit wildcard
bash: [":*"]instead ofbash: trueEnable firewall for untrusted input - Workflows with
issues,pull_request, orworkflow_dispatchtriggers should usenetwork.firewallUse network allowlists - Always specify
network.alloweddomains, minimum[defaults, github]Review permissions regularly - Audit GitHub
permissions:and tool permissions quarterlyPerformance Best Practices
Right-size timeouts - Most workflows: 10-20 minutes; Complex: 30-45 minutes; Avoid 60+ minutes
Select appropriate models - Quick tasks:
gpt-5-mini; Code generation:gpt-5.1-codex; Complex:claude-sonnet-4Pre-fetch data - Use custom
steps:to download data before AI executionSplit long workflows - If >45 minutes, consider splitting into multiple workflows
Use repo-memory - Cache expensive computations across runs
Configuration Best Practices
Use specific tool permissions - Avoid wildcards unless necessary; be explicit
Document complex configurations - Add comments explaining non-obvious choices
Version pin critical workflows - Use
engine.versionfor production-critical workflowsTest with strict mode - Compile with
--strictto catch issues earlyLeverage custom agents - Create reusable agent templates for common patterns
Maintenance Best Practices
Regular security audits - Review permissions and toolsets quarterly
Monitor timeout trends - Identify workflows getting slower over time
Track costs - Monitor token usage and optimize model selection
Update dependencies - Keep Copilot CLI version current (unless pinned)
Share learnings - Document successful patterns for team
6️⃣ Action Items
Immediate Actions (This Week)
toolsets: [all]and fixbash: trueand restrictShort-term (This Month)
gh aw audit --security)Long-term (This Quarter)
7️⃣ Trends & Insights
Positive Trends ✅
Concerning Trends⚠️
[all]toolset, 13 usebash: true- too permissiveAdoption Lifecycle Assessment
View Research Methodology
Research Methodology
Data Collection
Code Analysis:
pkg/workflow/copilot*.gopkg/workflow/copilot_engine.gopkg/workflow/copilot_engine_execution.gopkg/workflow/copilot_engine_tools.goWorkflow Survey:
Feature Usage Analysis:
Documentation Review:
docs/src/content/docs/reference/engines.md.github/aw/github-agentic-workflows.mdpkg/constants/constants.goAnalysis Techniques
Quantitative Analysis:
Qualitative Analysis:
Gap Analysis:
Risk Assessment:
Limitations
Tools Used
grep,awk,wcfor pattern matching and countinggitfor file trackingRecommendations for Future Research
Future Research Directions
Security Effectiveness Study
Cost-Performance Analysis
Plugin Ecosystem Development
Custom Agent Impact
Adoption Drivers
Next Research Date: May 8, 2026 (3 months)
Research Agent: Copilot CLI Deep Research
Workflow Run: §21800507234
Beta Was this translation helpful? Give feedback.
All reactions