Conversation
|
Codex usage limits have been reached for code reviews. Please check with the admins of this repo to increase the limits by adding credits. |
|
Note Reviews pausedIt looks like this branch is under active development. To avoid overwhelming you with review comments due to an influx of new commits, CodeRabbit has automatically paused this review. You can configure this behavior by changing the Use the following commands to manage reviews:
Use the checkboxes below for quick actions:
📝 WalkthroughWalkthrougha new github actions workflow Changes
Sequence Diagram(s)mermaid estimated code review effort🎯 3 (Moderate) | ⏱️ ~20 minutes additional notes
🚥 Pre-merge checks | ✅ 3✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
✨ Simplify code
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Actionable comments posted: 4
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.
Inline comments:
In @.github/workflows/codex-plugin-scanner.yml:
- Around line 1-17: Add a regression test job that validates the workflow's
enforcement by running the same scanner action against known-good and known-bad
fixture directories and asserting expected outcomes; create a new job (e.g.,
scan-regression) that reuses the "Codex plugin scanner" step but sets plugin_dir
to a "fixtures/good" and "fixtures/bad" path in separate steps or matrix, and
for the bad fixture assert the step fails (or check exit code/output) while for
the good fixture assert success, so future edits to the "scan" job cannot
silently weaken checks.
- Around line 3-7: Add a top-level concurrency stanza to the GitHub Actions
workflow to prevent duplicate runs for the same ref/PR (use a key like
github.workflow + github.ref and cancel-in-progress: true), and update the job
configuration that currently targets only ubuntu (look for runs-on or matrix.os
in the job definition) to include a windows runner (e.g., add "windows-latest"
to the matrix or an explicit job run) so Windows path/sep edge cases are
covered; ensure the concurrency block is placed alongside the on: stanza and the
job matrix/runs-on change is applied to the CI job responsible for the
codex-plugin scan.
- Around line 9-12: Add explicit least-privilege permissions and a job timeout
to the "scan" job: in the job definition for scan, add a minimal permissions
block (e.g., only permissions: contents: read and id-token: write or whatever
minimal scopes your scanner requires) and set timeout-minutes to a sensible
value (e.g., 10-30) to prevent hung runs; update the "scan" job YAML to include
these keys adjacent to runs-on/steps so the workflow uses limited token scope
and a hard timeout.
- Around line 13-15: The workflow currently uses mutable version tags (e.g.,
actions/checkout@v4 and hashgraph-online/hol-codex-plugin-scanner-action@v1);
update each uses: entry to reference the immutable commit SHA for those actions
(replace `@vX` with @<full-commit-sha>), and apply the same change across all
workflows (ci.yml, pr-ci.yml, codeql.yml) to remove mutable tags; also add an
explicit permissions block with least-privilege scopes, add concurrency settings
(concurrency: { group: github.workflow + github.ref, cancel-in-progress: true })
to prevent duplicate runs, and include a windows runner job or matrix entry
(ubuntu + windows) so the scanner runs on windows to catch path/case issues
before merging.
🪄 Autofix (Beta)
Fix all unresolved CodeRabbit comments on this PR:
- Push a commit to this branch (recommended)
- Create a new PR with the fixes
ℹ️ Review info
⚙️ Run configuration
Configuration used: Organization UI
Review profile: ASSERTIVE
Plan: Pro
Run ID: 51325641-d7a9-4dd8-9cfb-bc3a3fda5e6e
📒 Files selected for processing (1)
.github/workflows/codex-plugin-scanner.yml
📜 Review details
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (1)
- GitHub Check: Greptile Review
There was a problem hiding this comment.
Actionable comments posted: 1
♻️ Duplicate comments (2)
.github/workflows/codex-plugin-scanner.yml (2)
15-15: 🧹 Nitpick | 🔵 Trivialwindows edge-case coverage is still missing.
this still runs only on
ubuntu-latest; path-separator and case-sensitivity behavior on windows is untested. add a windows matrix leg if the scanner or plugin packaging touches filesystem semantics. reference:.github/workflows/codex-plugin-scanner.yml:15.🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed. In @.github/workflows/codex-plugin-scanner.yml at line 15, The workflow currently only runs on "ubuntu-latest", so add a Windows job to cover path-separator/case-sensitivity edge cases by turning the job into a matrix or adding a parallel job that uses "windows-latest"; update the job that currently sets "runs-on: ubuntu-latest" (the scanner/packaging job) to either use a matrix.runs-on: [ubuntu-latest, windows-latest] or add an explicit windows leg, and ensure any OS-specific steps (checkout, build, packaging) run for both runners so filesystem semantics are exercised.
13-24: 🧹 Nitpick | 🔵 Trivialworkflow contract regression checks are still missing.
there is no fixture-based good/bad manifest regression job to prove this gate fails/passes as intended after future edits. add a small matrix job for known-good and known-bad fixtures. reference:
.github/workflows/codex-plugin-scanner.yml:13-24.i can draft that
scan-regressionjob and fixture layout if you want.🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed. In @.github/workflows/codex-plugin-scanner.yml around lines 13 - 24, Add a new GitHub Actions job named "scan-regression" alongside the existing "scan" job that runs a small matrix over fixtures ("good" and "bad") to validate the scanner gate; reuse the same checkout step and the hashgraph-online/hol-codex-plugin-scanner-action invocation but set plugin_dir to point at the fixture subfolders (e.g., plugin_dir: "fixtures/${{ matrix.case }}"), configure matrix: [case: good,bad] and set expected outcome: allow the good case to pass and assert the bad case fails (use continue-on-error: true and a follow-up step to fail the job when matrix.case == 'bad' and the scanner succeeded, or invert logic to require non-zero exit for bad), and include timeout/permissions matching the existing "scan" job so future edits are validated by fixture-based regression tests.
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.
Inline comments:
In @.github/workflows/codex-plugin-scanner.yml:
- Line 24: The workflow currently sets plugin_dir: "." which scans the entire
repo and pulls in unrelated files; change the plugin_dir value to
".codex-plugin/" in the codex-plugin-scanner workflow so the scanner targets the
plugin manifest location (.codex-plugin/plugin.json) and avoids repo-wide
noise—update the plugin_dir key in the job definition to ".codex-plugin/" (look
for plugin_dir in the workflow file).
---
Duplicate comments:
In @.github/workflows/codex-plugin-scanner.yml:
- Line 15: The workflow currently only runs on "ubuntu-latest", so add a Windows
job to cover path-separator/case-sensitivity edge cases by turning the job into
a matrix or adding a parallel job that uses "windows-latest"; update the job
that currently sets "runs-on: ubuntu-latest" (the scanner/packaging job) to
either use a matrix.runs-on: [ubuntu-latest, windows-latest] or add an explicit
windows leg, and ensure any OS-specific steps (checkout, build, packaging) run
for both runners so filesystem semantics are exercised.
- Around line 13-24: Add a new GitHub Actions job named "scan-regression"
alongside the existing "scan" job that runs a small matrix over fixtures ("good"
and "bad") to validate the scanner gate; reuse the same checkout step and the
hashgraph-online/hol-codex-plugin-scanner-action invocation but set plugin_dir
to point at the fixture subfolders (e.g., plugin_dir: "fixtures/${{ matrix.case
}}"), configure matrix: [case: good,bad] and set expected outcome: allow the
good case to pass and assert the bad case fails (use continue-on-error: true and
a follow-up step to fail the job when matrix.case == 'bad' and the scanner
succeeded, or invert logic to require non-zero exit for bad), and include
timeout/permissions matching the existing "scan" job so future edits are
validated by fixture-based regression tests.
🪄 Autofix (Beta)
Fix all unresolved CodeRabbit comments on this PR:
- Push a commit to this branch (recommended)
- Create a new PR with the fixes
ℹ️ Review info
⚙️ Run configuration
Configuration used: Organization UI
Review profile: ASSERTIVE
Plan: Pro
Run ID: ada45643-cb92-4c17-bf03-36962f4eb7cc
📒 Files selected for processing (1)
.github/workflows/codex-plugin-scanner.yml
📜 Review details
🔇 Additional comments (1)
.github/workflows/codex-plugin-scanner.yml (1)
16-22: good hardening updates landed here.timeout, least-privilege permissions, and sha-pinned actions are all in place and match the security/reliability objectives. reference:
.github/workflows/codex-plugin-scanner.yml:16-22.
There was a problem hiding this comment.
♻️ Duplicate comments (2)
.github/workflows/codex-plugin-scanner.yml (2)
9-11: 🧹 Nitpick | 🔵 Trivialconcurrency group should include workflow name to prevent cross-workflow interference.
the current group
codex-plugin-scanner-${{ github.ref }}works but isn't defensive. if you later add another workflow with a similar group prefix, they could cancel each other. standard pattern is${{ github.workflow }}-${{ github.ref }}to namespace by workflow.🔧 defensive concurrency pattern
concurrency: - group: codex-plugin-scanner-${{ github.ref }} + group: ${{ github.workflow }}-${{ github.ref }} cancel-in-progress: true🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed. In @.github/workflows/codex-plugin-scanner.yml around lines 9 - 11, The concurrency group is currently hardcoded as "codex-plugin-scanner-${{ github.ref }}" which can collide with other workflows; update the concurrency group to include the workflow name (use the built-in github.workflow value) so it becomes "${{ github.workflow }}-${{ github.ref }}" to namespace by workflow and avoid cross-workflow cancellation (modify the concurrency.group value in the concurrency block).
21-25:⚠️ Potential issue | 🟠 Major
plugin_dir: "."misses the actual manifest location.the plugin manifest lives at
.codex-plugin/plugin.json:1, but the scanner is configured to scan from repo root. this means the quality gate won't find the plugin at all—it will either skip validation or scan unrelated config files. the previous review marked this fixed in d7d292f but the current code still has the wrong path.fix: point scanner to the manifest directory
with: - plugin_dir: "." + plugin_dir: ".codex-plugin" min_score: "70"the manifest structure is valid (
codex-multi-auth:1.2.1), so once the path is corrected, the scanner will work as intended.🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed. In @.github/workflows/codex-plugin-scanner.yml around lines 21 - 25, The workflow step named "Codex plugin scanner" is pointing plugin_dir to the repo root; update the action input plugin_dir to the actual manifest directory ".codex-plugin" so the scanner reads .codex-plugin/plugin.json; locate the step using the action identifier hashgraph-online/hol-codex-plugin-scanner-action and change plugin_dir from "." to ".codex-plugin" (leave min_score as-is) so the quality gate runs against the correct manifest.
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.
Duplicate comments:
In @.github/workflows/codex-plugin-scanner.yml:
- Around line 9-11: The concurrency group is currently hardcoded as
"codex-plugin-scanner-${{ github.ref }}" which can collide with other workflows;
update the concurrency group to include the workflow name (use the built-in
github.workflow value) so it becomes "${{ github.workflow }}-${{ github.ref }}"
to namespace by workflow and avoid cross-workflow cancellation (modify the
concurrency.group value in the concurrency block).
- Around line 21-25: The workflow step named "Codex plugin scanner" is pointing
plugin_dir to the repo root; update the action input plugin_dir to the actual
manifest directory ".codex-plugin" so the scanner reads
.codex-plugin/plugin.json; locate the step using the action identifier
hashgraph-online/hol-codex-plugin-scanner-action and change plugin_dir from "."
to ".codex-plugin" (leave min_score as-is) so the quality gate runs against the
correct manifest.
ℹ️ Review info
⚙️ Run configuration
Configuration used: Organization UI
Review profile: ASSERTIVE
Plan: Pro
Run ID: b21cdc1c-e0af-4358-93d1-ba108a36a454
📒 Files selected for processing (1)
.github/workflows/codex-plugin-scanner.yml
📜 Review details
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (1)
- GitHub Check: Greptile Review
🔇 Additional comments (4)
.github/workflows/codex-plugin-scanner.yml (4)
1-2: lgtm—clear workflow name.the name accurately describes what this workflow does (quality gate for codex plugin manifest).
3-7: trigger configuration is correct.push + pull_request to main is the right pattern for a quality gate check.
13-19: job config is solid—timeout and permissions are correct.the 10-minute timeout and
contents: readpermission follow best practices. past reviews suggested adding windows-latest to catch path/case edge cases, but for a json manifest scanner this is probably overkill—plugin.json parsing isn't platform-sensitive like compiled code or filesystem operations.
20-20: checkout action properly pinned to commit sha.using immutable sha
34e114876b0b11c390a56381ad16ebd13914f8d5instead of mutable tag prevents supply-chain takeover risk.
|
Verified the pinned scanner action locally before changing
This PR keeps the correct repo-root scan target and adds |
There was a problem hiding this comment.
Actionable comments posted: 1
♻️ Duplicate comments (1)
.github/workflows/codex-plugin-scanner.yml (1)
15-15: 🧹 Nitpick | 🔵 Trivialwindows path edge cases are still untested.
scanner runs only on ubuntu. if this repo/tooling ever introduces path-separator or case-sensitivity assumptions, this workflow will not catch them.
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed. In @.github/workflows/codex-plugin-scanner.yml at line 15, The workflow currently hard-codes runs-on: ubuntu-latest so Windows path and case-sensitivity edge cases won't be exercised; change the job to use a matrix (strategy.matrix.os) and set runs-on: ${{ matrix.os }} with at least ubuntu-latest and windows-latest entries (and optionally macos-latest) so the scanner runs on Windows too, and update any OS-specific step commands (e.g., shell settings or path separators) referenced in the job to be matrix-safe (use Node/PowerShell cross-platform actions or conditional steps if needed).
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.
Inline comments:
In @.github/workflows/codex-plugin-scanner.yml:
- Around line 3-7: The workflow lacks a manual trigger so you cannot run
regression scans without committing; add a manual trigger by including
workflow_dispatch under the top-level on: (alongside push and pull_request) in
the .github/workflows/codex-plugin-scanner.yml file so maintainers can run the
scanner workflow manually for plugin manifest/regression checks.
---
Duplicate comments:
In @.github/workflows/codex-plugin-scanner.yml:
- Line 15: The workflow currently hard-codes runs-on: ubuntu-latest so Windows
path and case-sensitivity edge cases won't be exercised; change the job to use a
matrix (strategy.matrix.os) and set runs-on: ${{ matrix.os }} with at least
ubuntu-latest and windows-latest entries (and optionally macos-latest) so the
scanner runs on Windows too, and update any OS-specific step commands (e.g.,
shell settings or path separators) referenced in the job to be matrix-safe (use
Node/PowerShell cross-platform actions or conditional steps if needed).
🪄 Autofix (Beta)
Fix all unresolved CodeRabbit comments on this PR:
- Push a commit to this branch (recommended)
- Create a new PR with the fixes
ℹ️ Review info
⚙️ Run configuration
Configuration used: Organization UI
Review profile: ASSERTIVE
Plan: Pro
Run ID: 0685b6f9-9ce6-43f6-96d2-7d908949eb42
📒 Files selected for processing (1)
.github/workflows/codex-plugin-scanner.yml
📜 Review details
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (1)
- GitHub Check: Greptile Review
🔇 Additional comments (1)
.github/workflows/codex-plugin-scanner.yml (1)
24-25: plugin_dir: "." is correct per action defaults and examples.the pinned action's
action.ymldeclaresplugin_dirdefault as"."and describes it as "path to the plugin directory to scan (default: repository root)". the readme consistently showsplugin_dir: "."andplugin_dir: "./my-plugin"in examples, confirming repo-root scanning is the intended pattern. the inline workflow comment is accurate—the action knows to find.codex-plugin/plugin.jsonwithin the provided plugin_dir.
There was a problem hiding this comment.
Actionable comments posted: 2
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.
Inline comments:
In @.github/plugin-scanner-fixtures/bad/.codex-plugin/plugin.json:
- Around line 4-5: Remove the trailing comma after the "description" property in
the JSON manifest so the file parses as valid JSON; specifically edit the
plugin.json entry containing the "description" key to ensure the last property
before the closing brace has no comma (the trailing comma causes the parse error
at the closing brace).
In @.github/workflows/codex-plugin-scanner.yml:
- Around line 33-47: The regression workflow job scan-regression only runs on
ubuntu-latest which leaves Windows untested; update the scan-regression matrix
to include os: [ubuntu-latest, windows-latest] (or add a separate matrix axis
with key os) so the regression runs on both platforms, and ensure the job's
shell setting is compatible on Windows by setting shell: bash (or conditionally
using shell: bash on windows-latest) so path-casing and separator issues on
Windows will be exercised; modify the matrix and shell configuration for the
scan-regression job accordingly.
🪄 Autofix (Beta)
Fix all unresolved CodeRabbit comments on this PR:
- Push a commit to this branch (recommended)
- Create a new PR with the fixes
ℹ️ Review info
⚙️ Run configuration
Configuration used: Organization UI
Review profile: ASSERTIVE
Plan: Pro
Run ID: 0bfe8f43-daaf-4491-9638-fd6d1a0acf58
📒 Files selected for processing (10)
.codex-plugin/plugin.json.github/plugin-scanner-fixtures/bad/.codex-plugin/plugin.json.github/plugin-scanner-fixtures/bad/README.md.github/plugin-scanner-fixtures/good/.codex-plugin/plugin.json.github/plugin-scanner-fixtures/good/.codexignore.github/plugin-scanner-fixtures/good/LICENSE.github/plugin-scanner-fixtures/good/README.md.github/plugin-scanner-fixtures/good/SECURITY.md.github/plugin-scanner-fixtures/good/skills/example/SKILL.md.github/workflows/codex-plugin-scanner.yml
📜 Review details
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (1)
- GitHub Check: Greptile Review
🧰 Additional context used
🪛 Biome (2.4.10)
.github/plugin-scanner-fixtures/bad/.codex-plugin/plugin.json
[error] 5-5: Expected a property but instead found '}'.
(parse)
🔇 Additional comments (11)
.github/plugin-scanner-fixtures/good/LICENSE (1)
1-3: looks good for fixture coverage.license stub is sufficient for this regression fixture. no windows edge case or concurrency risk in this static file.
.github/plugin-scanner-fixtures/good/SECURITY.md (1)
1-3: fixture security policy is fine.this is enough for scanner regression intent. no windows edge case or concurrency risk in this static file.
.github/plugin-scanner-fixtures/bad/README.md (1)
1-3: negative-fixture readme is clear.intent is explicit and supports regression readability.
.codex-plugin/plugin.json (1)
3-3: good version alignment update.line 3 syncs the manifest version with the release line and should prevent avoidable scanner-gate failures.
.github/plugin-scanner-fixtures/good/skills/example/SKILL.md (1)
1-8: skill fixture content is well-formed.front matter and markdown body are consistent with regression-fixture goals.
.github/plugin-scanner-fixtures/good/.codexignore (1)
1-1: this fixture ignore file is acceptable.no functional, windows, or concurrency concerns here.
.github/plugin-scanner-fixtures/good/README.md (1)
1-3: good-fixture documentation is clear.this supports regression intent and expected scanner outcome.
.github/plugin-scanner-fixtures/good/.codex-plugin/plugin.json (1)
1-11: lgtm, fixture manifest is well-formed.valid plugin metadata with all expected fields. the
skillspath at.github/plugin-scanner-fixtures/good/.codex-plugin/plugin.json:10correctly references the fixture's skills directory per the summary..github/workflows/codex-plugin-scanner.yml (3)
14-31: scan job looks solid after prior feedback.
.github/workflows/codex-plugin-scanner.yml:15-31has all the hardening from prior reviews: sha-pinned actions, scopedpermissions: contents: read,timeout-minutes: 10, cross-platform matrix. the inline comment at line 29 clarifies theplugin_dir: "."choice per the pinned action's behavior.
57-63: assertion step is correct.
.github/workflows/codex-plugin-scanner.yml:59-63compares scanner outcome to expected result. the interpolated values come from trusted workflow context and matrix definition, so no injection concern here.
1-12: triggers and concurrency configured correctly.
.github/workflows/codex-plugin-scanner.yml:3-8covers push, pr, and manual dispatch..github/workflows/codex-plugin-scanner.yml:10-12dedupes concurrent runs per branch withcancel-in-progress: true.
codex-multi-auth is listed in awesome-codex-plugins and already has solid CI around docs and PR hygiene. This PR adds a plugin manifest quality gate so
.codex-plugin/plugin.jsondrift gets caught before merge.What changed:
.github/workflows/codex-plugin-scanner.ymlusing the pinnedhashgraph-online/hol-codex-plugin-scanner-actionmin_score: 70ubuntu-latestandwindows-latestworkflow_dispatchfor manual reruns.codex-plugin/plugin.jsonversion to1.2.2so the new gate starts greenLocal validation:
codex-plugin-scanner scan --min-score 70 <repo>=> pass (72)codex-plugin-scanner scan --min-score 70 .github/plugin-scanner-fixtures/good=> pass (94)codex-plugin-scanner scan --min-score 70 .github/plugin-scanner-fixtures/bad=> fail (50)note: greptile review for oc-chatgpt-multi-auth. cite files like
lib/foo.ts:123. confirm regression tests + windows concurrency/token redaction coverage.Greptile Summary
adds a codex plugin quality gate to ci, scanning
.codex-plugin/plugin.jsonagainst amin_score: 70threshold on both ubuntu and windows. all three issues from the previous review round are resolved: both github actions are now sha-pinned, the manifest version is synced to1.2.2, and theplugin_dircomment clarifies the action's root-relative resolution behaviour. regression fixtures exercise the scanner against a known-good layout (expected score ~94) and a minimal bad layout (expected score ~50), with the outcome assertion correctly usingcontinue-on-errorplus a bash gate.actions/checkoutandhol-codex-plugin-scanner-actionare pinned to full commit shas — supply-chain drift is eliminated1.2.2matches the rest of the codebase — gate starts green on day onefail-fast: falseon both matrix strategies ensures all os/fixture combinations are always reportedAssert fixture outcomestep injects${{ steps.scan.outcome }}and${{ matrix.expect_outcome }}inline into bash — values are workflow-controlled today so no real risk, but the pattern is worth cleaning up with anenv:block before it gets extended to user-supplied inputs.github/plugin-scanner-fixtures/good) which is generally safe in github actions but worth monitoring if the scanner action performs raw win32 filesystem ops without path normalizationConfidence Score: 5/5
pr is safe to merge — all three prior p1 findings are resolved, one p2 style note remains
the unpinned action, version drift, and plugin_dir ambiguity were the three blocking concerns in the previous round; all three are addressed. the only remaining item is a p2 shell expression idiom that carries no actual injection risk with the current workflow-controlled values. no application code or tests were modified.
no files require blocking attention —
.github/workflows/codex-plugin-scanner.ymlline 70 has a minor idiom worth cleaning up but does not block mergeImportant Files Changed
Sequence Diagram
sequenceDiagram participant GH as GitHub Push/PR participant scan as scan (ubuntu+windows) participant reg as scan-regression (ubuntu+windows) participant action as hol-codex-plugin-scanner-action participant assert as Assert fixture outcome GH->>scan: trigger GH->>reg: trigger (parallel) scan->>action: plugin_dir=".", min_score=70 action-->>scan: score ≥70 → pass reg->>action: fixture/good, min_score=70 action-->>reg: score ~94 (continue-on-error) reg->>assert: outcome=success vs expect=success ✓ reg->>action: fixture/bad, min_score=70 action-->>reg: score ~50 (continue-on-error) reg->>assert: outcome=failure vs expect=failure ✓Prompt To Fix All With AI
Reviews (9): Last reviewed commit: "ci: tighten plugin scanner regression co..." | Re-trigger Greptile