[uk ai resilience] UK AI Open Code Risk & Resilience Governance Report — 2026-05-19 #33357
Closed
Replies: 1 comment
-
|
This discussion has been marked as outdated by UK AI Operational Resilience. A newer discussion is available at Discussion #33588. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Executive Summary
The gh-aw repository (GitHub Agentic Workflows CLI) demonstrates strong foundational security controls (5/6 domains passing) but faces critical AI-era attack surface amplification requiring immediate remediation before broader AI agent exposure.
Key Metrics:
Overall Risk Posture:⚠️ Medium-High (pending Tier C/D remediation)
Recommendation: Implement UK AI guidance with resilience-first approach - maintain public repository while addressing operational vulnerabilities through time-boxed remediation plan.
View Full Asset Graph & Changed Surfaces
Changed Surfaces (7-Day Window)
Dependency Landscape:
Ownership Signals:
@dsyme,@eaftan,@pelikhan,@krzysztof-cieslakView Control Verification Status
Control Domain Status
Overall Score: 5 Pass, 1 Partial, 0 Fail
Critical Finding: Despite strong controls, recovery domain gap (no release tags) prevents reliable rollback capability - a key resilience requirement under UK AI guidance.
AI-Aware Risk Scoring
Risk Dimension Scores (1-5 scale, 5=highest risk)
Tier Distribution: A=2 (25%), B=3 (37.5%), C=2 (25%), D=1 (12.5%)
View Critical Risk Areas
🔴 Tier D - Decommission Candidate
Cache & Memory Systems (Score: 3.2)
Why Tier D:
Evidence:
Remediation SLA: 🔴 CRITICAL - 2 weeks
🔴 Tier C - Restricted Pending Review
MCP Server Integration (Score: 3.6)
Why Tier C:
Evidence:
allowed: ["*"]wildcardsmax-calls) intools.github.allowed#18407: No per-tool call limitsRemediation SLA: 🔴 CRITICAL - 4 weeks
Workflow Compilation Engine (Score: 4.2)
Why Tier C:
Evidence:
go/allocation-size-overflowalerts (3 in pkg/workflow)MergeUniqueallocation sizing against integer overflow (CodeQL #592) #32842Remediation SLA: 🔴 CRITICAL - 6 weeks
Tier Classification Summary
Decision: Repository remains PUBLIC (aligned with UK AI "resilience over secrecy" guidance) with temporary operational restrictions on AI agent access to Tier C/D areas until remediation complete.
View Remediation Queue & SLAs
Phase 1: Emergency Stabilization (Weeks 1-2)
@pelikhan@dsyme@eaftanPhase 2: Core Security Remediation (Weeks 3-6)
@pelikhanallowed: ["*"]in production@dsyme@eaftan@pelikhanPhase 3: Hardening & Monitoring (Weeks 7-8)
@dsyme@eaftan@pelikhan@dsymeHuman-Review Triggers:
View Exception Register
Temporary Exceptions (Time-Boxed)
No permanent exceptions granted. All must resolve within SLA or escalate to human review for architecture decision.
Operational Metrics Baseline
Current State (7-Day Window)
Key Performance Indicators (KPIs) for Next Assessment:
Governance Decision
Recommendation: ✅ MAINTAIN PUBLIC REPOSITORY with time-boxed operational restrictions
Rationale:
Conditions for Continued Open Operation:
Alternative Considered & Rejected:
Approval Authority: CODEOWNERS (
@dsyme,@eaftan,@pelikhan,@krzysztof-cieslak)Continuous Reassessment Schedule
Cadence: Bi-weekly during remediation phase (8 weeks), then monthly
Next Assessment: 2026-06-02 (2 weeks)
Triggers for Out-of-Band Assessment:
References:
max-calls) intools.github.allowed#18407, Have "santize" mode where GitHub MCP tools box and sanitize text content according to contributor status #19967Beta Was this translation helpful? Give feedback.
All reactions