[copilot-cli-research] Copilot CLI Deep Research - February 2026 #13311
Closed
Replies: 1 comment
-
|
This discussion was automatically closed because it expired on 2026-02-09T16:10:41.887Z.
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
🔍 Copilot CLI Deep Research Report
Analysis Date: February 2, 2026
Repository: githubnext/gh-aw
Workflow Run: §21597477191
Scope: 149 total workflows, 73 using Copilot engine (49%)
📊 Executive Summary
Research Topic: Copilot CLI Optimization Opportunities
Key Findings:
Primary Recommendation: Increase sandbox/firewall adoption from 13% to at least 50% to improve security posture and prevent unauthorized network access.
The repository demonstrates strong Copilot CLI adoption with 73 workflows actively using the engine. However, significant opportunities exist to leverage advanced features like sandboxing (87% of workflows lack it), repo-memory for state management (81% don't use it), and web-fetch for research tasks (93% miss this capability). Security should be the top priority given low firewall adoption.
Critical Findings
🔴 High Priority Issues
1. Low Sandbox Adoption (Security Risk)
sandbox: awforsandbox: srtby default for all workflows2. Repo-Memory Underutilization (State Management Gap)
🟡 Medium Priority Opportunities
3. Web-Fetch Tool Severely Underutilized
4. Limited Engine Configuration Customization
engine.agent,engine.model,engine.args1️⃣ Current State Analysis
View Copilot CLI Capabilities Inventory
Copilot CLI Capabilities Inventory
Available CLI Flags (from
copilot_engine_execution.go):--add-dir- Add directories to agent's accessible paths--agent- Specify custom agent file--agent-image- Select container image for AWF--allow-all-paths- Allow write access to all paths (for edit tool)--allow-domains- Network allowlist for firewall--block-domains- Network blocklist for firewall--container-workdir- Set container working directory--disable-builtin-mcps- Disable built-in MCP servers--enable-host-access- Allow host.docker.internal access (for MCP gateway)--env-all- Pass all environment variables--image-tag- Pin AWF Docker image version--log-dir- Log output directory--log-level- Logging verbosity--model- Override AI model--mount- Mount host paths in container--prompt- Agent prompt/instruction--proxy-logs-dir- Proxy logs directory--share- Generate conversation markdown fileEngine Configuration Options:
Available Tools:
bash- Shell command execution with wildcards or specific commandsedit- File editing capabilitiesgithub- GitHub API access with granular toolsets (default, repos, issues, pull_requests, actions, code_security, etc.)web-fetch- Web content fetching (built-in)repo-memory- Persistent git-backed storagecache-memory- Session-scoped file cachingagentic-workflows- MCP server for workflow managementserena- Code generation and Mermaid diagram toolsplaywright- Browser automation (containerized)Sandbox Options:
sandbox: awf- AWF firewall with network restrictionssandbox: srt- Sandbox Runtime with process isolationNetwork Permissions:
Safe Outputs - 20+ types for GitHub resource creation:
create-issue,create-pull-request,create-discussionadd-comment,add-labels,assign-to-userView Usage Statistics
Usage Statistics
Overall Adoption:
Feature Adoption (across all 149 workflows):
Tool Configuration Patterns:
*) or specific command listsTimeout Configuration:
2️⃣ Feature Usage Matrix
*Auto-enabled by compiler
**Percentage of workflows using that feature category
3️⃣ Missed Opportunities
View High Priority Opportunities
🔴 High Priority
Opportunity 1: Enable Sandbox/Firewall by Default
What: Only 13% of workflows use
sandbox: awforsandbox: srtfor network isolationWhy It Matters:
Where: All Copilot workflows should enable sandbox unless they have a specific reason not to
How to Implement:
Example Workflows to Update:
ai-moderator.md- Reads GitHub data only, should have strict network limitsauto-triage-issues.md- Labels issues, no external network neededdaily-assign-issue-to-user.md- Assigns issues, should be fully sandboxedExpected Benefits:
Trade-offs:
Opportunity 2: Increase Repo-Memory Adoption
What: Only 19% of workflows use
repo-memoryfor persistent state trackingWhy It Matters:
Where: Workflows that benefit from historical context:
How to Implement:
Example Workflows to Update:
ai-moderator.md - Track moderation patterns and false positives
cli-consistency-checker.md - Track known issues to avoid re-reporting
daily-copilot-token-report.md - Already using repo-memory ✅ (good example!)
Expected Benefits:
Opportunity 3: Document --share Flag Benefits
What: The
--shareflag is auto-enabled but its benefits aren't documentedWhy It Matters:
Action Required:
View Medium Priority Opportunities
🟡 Medium Priority
Opportunity 4: Promote Web-Fetch Tool Usage
What: Only 7% of workflows use the built-in
web-fetchtoolWhy It Matters:
Where: Workflows that could benefit:
How to Implement:
Example Workflows to Update:
Expected Benefits:
Opportunity 5: Enable engine.agent Configuration
What: Zero workflows use
engine.agentto specify custom agent filesWhy It Matters:
Where: Workflows with unique agent personas or specialized instructions
How to Implement:
Note: The
agent:field inengineconfiguration controls the--agentCLI flag. This is distinct from agent imports (.github/imports/*.md) which only import markdown content into the prompt but don't set the flag.Example Usage:
Opportunity 6: Model Selection Guidance
What: Only ~4% of workflows customize the AI model via
engine.modelWhy It Matters:
Where: Task-specific model selection opportunities:
gpt-5.1-codex-mini(fast, cheap)gpt-5.1-codexorgpt-5.2(quality)gpt-5.1-codex(code-specialized)How to Implement:
Example:
ai-moderator.mdalready usesgpt-5.1-codex-mini✅Opportunity 7: Network Blocklist Usage
What: Zero workflows use
network.blockedfor domain blocklistsWhy It Matters:
How to Implement:
Use Cases:
View Low Priority Opportunities
🟢 Low Priority
Opportunity 8: Custom Args Patterns
What: Only ~1% of workflows use
engine.argsfor custom CLI argumentsWhy It Matters:
Example:
Opportunity 9: Environment Variable Customization
What: Only ~3% of workflows use
engine.envfor custom environment variablesWhy It Matters:
Example:
Opportunity 10: Timeout Optimization
What: Most workflows use default 30-minute timeout without tuning
Why It Matters:
Recommendation:
Opportunity 11: GitHub Toolsets Granularity
What: Most workflows use
toolsets: [default]without fine-grained permissionsWhy It Matters:
Recommendation:
[issues],[pull_requests],[repos][default]unless you need multiple toolsetsExample:
Opportunity 12: Custom MCP Server Integration
What: Very limited use of custom MCP servers beyond built-ins
Why It Matters:
Example:
4️⃣ Specific Workflow Recommendations
View Workflow-Specific Recommendations
High-Value Quick Wins
1. ai-moderator.md
2. auto-triage-issues.md
3. daily-assign-issue-to-user.md
4. cli-consistency-checker.md
5. claude-code-user-docs-review.md
6. copilot-cli-deep-research.md (This workflow!)
5️⃣ Best Practice Guidelines
Based on this research, here are recommended best practices for Copilot workflows:
Security First
sandbox: awfunless you have a specific reason not to*[default]State Management
Performance & Cost
gpt-5.1-codex-minifor detection/triageConfiguration
engine.modelto lock versionsIntegration
6️⃣ Action Items
Immediate Actions (this week):
Short-term (this month):
Long-term (this quarter):
View Supporting Evidence & Methodology
📚 References
pkg/workflow/copilot_engine.go,copilot_engine_execution.go,copilot_engine_tools.gopkg/workflow/copilot_mcp.go.github/aw/github-agentic-workflows.md.github/workflows/*.md(149 workflows analyzed)Research Methodology
Data Collection
Analysis Techniques
Tools Used
grep,find,wcfor counting and pattern matchingpkg/workflow/copilot_*.gofilesLimitations
Validation
copilot_engine_execution.goBaseEnginestructReferences:
memory/copilot-cli-research/latest.jsonmemory/copilot-cli-research/notes.mdBeta Was this translation helpful? Give feedback.
All reactions