Security Guard #808
security-guard.lock.yml
on: pull_request
Annotations
6 warnings and 1 notice
|
agent
Unexpected input(s) 'depth', valid inputs are ['repository', 'ref', 'token', 'ssh-key', 'ssh-known-hosts', 'ssh-strict', 'ssh-user', 'persist-credentials', 'path', 'clean', 'filter', 'sparse-checkout', 'sparse-checkout-cone-mode', 'fetch-depth', 'fetch-tags', 'show-progress', 'lfs', 'submodules', 'set-safe-directory', 'github-server-url']
|
|
agent
Failed to process file /tmp/gh-aw/mcp-logs/rpc-messages.jsonl: EACCES: permission denied, open '/tmp/gh-aw/mcp-logs/rpc-messages.jsonl'
|
|
agent
Failed to process file /tmp/gh-aw/mcp-logs/mcp-gateway.log: EACCES: permission denied, open '/tmp/gh-aw/mcp-logs/mcp-gateway.log'
|
|
agent
File workflows/security-guard.md contains front matter which will be ignored in runtime import
|
|
agent
GitHub MCP lockdown mode enabled for public repository. This prevents the GitHub token from accessing private repositories.
|
|
agent
Unexpected input(s) 'depth', valid inputs are ['repository', 'ref', 'token', 'ssh-key', 'ssh-known-hosts', 'ssh-strict', 'ssh-user', 'persist-credentials', 'path', 'clean', 'filter', 'sparse-checkout', 'sparse-checkout-cone-mode', 'fetch-depth', 'fetch-tags', 'show-progress', 'lfs', 'submodules', 'set-safe-directory', 'github-server-url']
|
|
agent
Safe Outputs MCP Server Startup Log
|
Artifacts
Produced during runtime
| Name | Size | Digest | |
|---|---|---|---|
|
agent-artifacts
|
197 KB |
sha256:4310a7a9d0483a45581e3ba6c377e74072b8449d406c73ac24621e7551d371a9
|
|
|
agent-output
|
388 Bytes |
sha256:b97a4a5e4ee3008094a1a34793c8e00644deb6771af80fe0c14efb9e1d320229
|
|
|
safe-output
|
363 Bytes |
sha256:516e60292643cb4049bad871e7c2adc735b92d3d12a4f287f8296f4db1e203e2
|
|
|
threat-detection.log
|
8.24 KB |
sha256:b4a129145952156b9fdc89342145b87b7ee6700803dd519d54c96fdf02657741
|
|