openclaw 网盘下载
OpenClaw

技能详情(站内镜像,无评论)

首页 > 技能库 > GitHub Actions Failure Spike Audit

Detect sudden GitHub Actions failure-rate spikes by workflow group using recent-vs-baseline run windows.

开发与 DevOps

作者:Daniel Lummis @daniellummis

许可证:MIT-0

MIT-0 ·免费使用、修改和重新分发。无需归因。

版本:v1.0.0

统计:⭐ 0 · 155 · 0 current installs · 0 all-time installs

0

安装量(当前) 0

🛡 VirusTotal :良性 · OpenClaw :良性

Package:daniellummis/github-actions-failure-spike-audit

安全扫描(ClawHub)

  • VirusTotal :良性
  • OpenClaw :良性

OpenClaw 评估

The skill's code and instructions match its stated purpose (analyzing GitHub Actions run JSONs for failure-rate spikes); it requires only bash/python3, reads local JSON artifacts, and does not request secrets or perform network exfiltration.

目的

The skill claims to analyze GitHub Actions run JSON exports and the included script implements grouping, baseline/recent splits, failure-rate math, and reporting. Required binaries (bash, python3) are appropriate for the bundled shell+Python implementation.

说明范围

Runtime instructions ask the user to collect run JSONs (example shows using the GitHub CLI `gh run view`) and then run the provided script against local JSON artifacts. The example references the `gh` CLI but `gh` is not listed as a required binary — this is a minor documentation mismatch (the script itself does not invoke `gh`). The script reads only files matched by RUN_GLOB and does not contact external endpoints.

安装机制

This is instruction-only (no install spec). The code is bundled as a shell script that runs an embedded Python program; nothing is downloaded or written during install.

证书

No environment secrets or config paths are required. The script supports many optional environment variables for filtering and thresholds — these are proportionate to the skill's functionality and are not sensitive credentials. Note: if you use the `gh` CLI example to collect JSON, that CLI may require GitHub credentials (not part of this skill).

持久

The skill does not request persistent/global privileges, does not set always:true, and does not modify other skills or system settings. It runs on-demand against local artifact files.

综合结论

This skill appears coherent and implements what it advertises: it reads local GitHub Actions run JSON files and reports failure-rate spikes. Before running it, confirm the RUN_GLOB path only matches the intended JSON artifacts (so you don't accidentally feed it unrelated local files). If you plan to use the SKILL.md's `gh run view` example, remember the GitHub CLI (gh) is not listed as a required binary and may need a GitHub token or login; th…

安装(复制给龙虾 AI)

将下方整段复制到龙虾中文库对话中,由龙虾按 SKILL.md 完成安装。

请把本段交给龙虾中文库(龙虾 AI)执行:为本机安装 OpenClaw 技能「GitHub Actions Failure Spike Audit」。简介:Detect sudden GitHub Actions failure-rate spikes by workflow group using recent…。
请 fetch 以下地址读取 SKILL.md 并按文档完成安装:https://raw.githubusercontent.com/openclaw/skills/refs/heads/main/skills/daniellummis/github-actions-failure-spike-audit/SKILL.md
(来源:yingzhi8.cn 技能库)

SKILL.md

打开原始 SKILL.md(GitHub raw)

---
name: github-actions-failure-spike-audit
description: Detect sudden GitHub Actions failure-rate spikes by workflow group using recent-vs-baseline run windows.
version: 1.0.0
metadata: {"openclaw":{"requires":{"bins":["bash","python3"]}}}
---

# GitHub Actions Failure Spike Audit

Use this skill to catch workflows that recently degraded (new flaky tests, broken deploy gates, bad dependency updates, or infra outages) before they become long-running incidents.

## What this skill does
- Reads GitHub Actions run JSON exports
- Groups by repository + workflow + branch + event
- Splits each group into **recent** runs and **baseline** history
- Compares recent failure rate to baseline failure rate
- Scores severity (`ok`, `warn`, `critical`) using spike + recent failure rate gates
- Emits text or JSON output for CI automation

## Inputs
Optional:
- `RUN_GLOB` (default: `artifacts/github-actions/*.json`)
- `TOP_N` (default: `20`)
- `OUTPUT_FORMAT` (`text` or `json`, default: `text`)
- `RECENT_RUNS` (default: `4`)
- `MIN_RECENT_RUNS` (default: `3`)
- `MIN_BASELINE_RUNS` (default: `4`)
- `WARN_SPIKE_PCT` (default: `15`)
- `CRITICAL_SPIKE_PCT` (default: `30`)
- `WARN_RECENT_FAILURE_RATE` (default: `25`)
- `CRITICAL_RECENT_FAILURE_RATE` (default: `45`)
- `WORKFLOW_MATCH` (regex, optional)
- `WORKFLOW_EXCLUDE` (regex, optional)
- `BRANCH_MATCH` (regex, optional)
- `BRANCH_EXCLUDE` (regex, optional)
- `EVENT_MATCH` (regex, optional)
- `EVENT_EXCLUDE` (regex, optional)
- `REPO_MATCH` (regex, optional)
- `REPO_EXCLUDE` (regex, optional)
- `FAIL_ON_CRITICAL` (`0` or `1`, default: `0`)

## Collect run JSON

```bash
gh run view <run-id> --json databaseId,workflowName,event,conclusion,headBranch,headSha,createdAt,updatedAt,startedAt,url,repository 
  > artifacts/github-actions/run-<run-id>.json
```

## Run

Text report:

```bash
RUN_GLOB='artifacts/github-actions/*.json' 
RECENT_RUNS=8 
WARN_SPIKE_PCT=12 
bash skills/github-actions-failure-spike-audit/scripts/failure-spike-audit.sh
```

JSON output + fail gate:

```bash
RUN_GLOB='artifacts/github-actions/*.json' 
OUTPUT_FORMAT=json 
FAIL_ON_CRITICAL=1 
bash skills/github-actions-failure-spike-audit/scripts/failure-spike-audit.sh
```

Run against bundled fixtures:

```bash
RUN_GLOB='skills/github-actions-failure-spike-audit/fixtures/*.json' 
bash skills/github-actions-failure-spike-audit/scripts/failure-spike-audit.sh
```

## Output contract
- Exit `0` in report mode (default)
- Exit `1` when `FAIL_ON_CRITICAL=1` and one or more groups are critical
- Text mode prints summary + ranked failure-rate spike groups
- JSON mode prints summary + ranked groups + critical groups