You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
UK AI Open Code Risk & Resilience Governance Assessment
Repository: github/gh-aw Assessment Period: 2026-05-13 to 2026-05-20 (7-day lookback) Assessment Date: 2026-05-20 Assessor: Automated governance workflow Framework: UK Public Sector AI Open Code Guidance
Executive Summary
Overall Risk Posture: TIER B - OPEN WITH CONDITIONS
The github/gh-aw repository demonstrates strong operational resilience through active maintenance, comprehensive security controls, and rapid patching. However, the AI-amplification risk profile requires enhanced monitoring and specific controls before unrestricted use in regulated environments.
Key Findings
✅ Strengths:
Active Security Hardening: 3 critical security fixes in 7-day window (heredoc injection, token exfiltration, template escape)
Strong Control Framework: 4/6 control domains PASS, 2/6 PARTIAL, 0 FAIL
Comprehensive Testing: 1,196 test files, 64% coverage, 263 CI workflows
Quarterly: Full control domain re-verification, incident response drill
Annually: Independent security audit
Guardrails Applied
✅ Read-only repository access (no modifications made)
✅ Concrete, verifiable findings only (no speculation)
✅ No permanent hidden-repo recommendations
✅ All exceptions are temporary and auditable (none required)
✅ Prioritized operational resilience over concealment
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
UK AI Open Code Risk & Resilience Governance Assessment
Repository: github/gh-aw
Assessment Period: 2026-05-13 to 2026-05-20 (7-day lookback)
Assessment Date: 2026-05-20
Assessor: Automated governance workflow
Framework: UK Public Sector AI Open Code Guidance
Executive Summary
Overall Risk Posture: TIER B - OPEN WITH CONDITIONS
The github/gh-aw repository demonstrates strong operational resilience through active maintenance, comprehensive security controls, and rapid patching. However, the AI-amplification risk profile requires enhanced monitoring and specific controls before unrestricted use in regulated environments.
Key Findings
✅ Strengths:
🔴 Open Alerts:
Phase 1: Asset Graph (Recent-Change Scoped)
High-Activity Components (7-Day Window)
Recent-Change Impact Assessment
472 commits in 7-day window (all by
@pelikhan) focused on:pull_request_reviewfromon.pull_request_reviewerhybrid routing #33461)Security-Signal Commits (99): Include:
Phase 2: Control Domain Verification
Control Summary: 4 PASS, 2 PARTIAL, 0 FAIL
View Detailed Control Evidence
1. Ownership Controls (⚠️ PARTIAL)
Evidence:
@dsyme,@eaftan,@pelikhan,@krzysztof-cieslakRecommendation: Activate additional maintainers or document contingency plan.
2. SDLC Controls (✅ PASS)
Evidence:
3. Dependency Controls (✅ PASS)
Evidence:
4. Secret Exposure Controls (✅ PASS)
Evidence:
5. Runtime Observability (✅ PASS)
Evidence:
6. Recovery Controls (⚠️ PARTIAL)
Evidence:
Phase 3: AI-Aware Risk Scoring
Risk Dimensions Assessed
Tier Distribution (12 Areas Scored)
Tier A (Open Safe): 3 areas
Tier B (Open With Conditions): 9 areas
Tier C (Restricted): 0 areas
Tier D (Decommission): 0 areas
Critical Security Boundaries
View Detailed Risk Scores
1. Safe-Outputs Sanitization System (TIER B - CRITICAL PRIORITY)
Risk Profile:
Evidence:
Required Controls:
2. MCP Gateway & Firewall Integration (TIER B - HIGH PRIORITY)
Risk Profile:
Evidence:
Required Controls:
3. Workflow Compiler (TIER B - HIGH PRIORITY)
Risk Profile:
Evidence:
Required Controls:
Phase 4: Decisioning & Remediation
Tier Classification Summary
TIER B - OPEN WITH CONDITIONS (repository-wide classification)
Rationale:
Remediation Queue (SLA-Tiered)
P0 - Critical (30-day SLA)
Activate Additional Maintainers
@pelikhanDocument Incident Response Runbook
Independent Security Audit of Safe-Outputs
P1 - High (60-day SLA)
Runtime Safe-Output Verification
Prompt Injection Detection
Tool Allowlist Enforcement in bypassPermissions Mode
Credential Rotation Policy
Verify Branch Protection Settings
P2 - Medium (90-day SLA)
Semantic Secret Scanning
Behavioral Baselining
Centralized Error Alerting
Dependabot Effectiveness Review
Exception Register: None
No temporary restricted-access exceptions required. All remediation items are process/control enhancements, not code restrictions.
Phase 5: Operational Metrics Baseline
Current State (2026-05-20)
Continuous Reassessment Schedule
Guardrails Applied
✅ Read-only repository access (no modifications made)
✅ Concrete, verifiable findings only (no speculation)
✅ No permanent hidden-repo recommendations
✅ All exceptions are temporary and auditable (none required)
✅ Prioritized operational resilience over concealment
Recommendations Summary
For Repository Maintainers
For Consumers (Regulated Environments)
TIER B - OPEN WITH CONDITIONS means:
For UK Public Sector Entities
Per UK AI Open Code guidance:
References
Assessment Methodology:
Next Reassessment: 2026-05-27 (weekly cadence during active development)
Beta Was this translation helpful? Give feedback.
All reactions