-
Notifications
You must be signed in to change notification settings - Fork 260
Description
Problem
GitHub Agentic Workflows require app: credentials (app-id, private-key) and engine tokens (e.g., COPILOT_GITHUB_TOKEN) to be stored as native GitHub Actions secrets and variables (${{ secrets.* }}, ${{ vars.* }}). In enterprise environments, secrets are managed by external providers like CyberArk Conjur, HashiCorp Vault, or AWS Secrets Manager -- and security policy may prohibit storing secrets directly in GitHub.
The compiled .lock.yml references ${{ secrets.* }} across multiple independent jobs (activation, agent, safe-outputs, conclusion). Since each job runs on a separate runner, a secret-fetching step in one job cannot make values available to the others through the ${{ secrets.* }} context.
Impact
Organizations that manage secrets through external providers (CyberArk Conjur, HashiCorp Vault, AWS Secrets Manager, Azure Key Vault) cannot adopt GitHub Agentic Workflows without either violating their secret management policies. A native integration would remove this friction for enterprise adoption.
Environment
- gh-aw version: v0.50.4