Add security alert burndown campaign with clustered fixes#11178
Closed
Add security alert burndown campaign with clustered fixes#11178
Conversation
- Create campaign spec for security alert burndown - Focus on file write issues first with prioritization - Support clustering up to 3 related alerts per PR - Use Claude engine for precise code generation with detailed comments - Use Copilot engine for campaign orchestration - Implement worker workflow with idempotency checks - Configure repo-memory for state tracking - Set up KPIs and governance policies Co-authored-by: mnkiefer <8320933+mnkiefer@users.noreply.github.com>
Co-authored-by: mnkiefer <8320933+mnkiefer@users.noreply.github.com>
Copilot
AI
changed the title
[WIP] Add campaign for security alert burndown
Add security alert burndown campaign with clustered fixes
Jan 22, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Implements an automated campaign to systematically remediate code scanning alerts, prioritizing file write vulnerabilities (path traversal, arbitrary file write, unsafe permissions).
Campaign Architecture
Orchestrator (Copilot): Discovers alerts via GitHub Code Scanning API, dispatches worker with clustered payloads (1-3 related alerts), tracks progress in repo-memory.
Worker (Claude): Generates security fixes with comprehensive inline documentation explaining vulnerability, attack vector, mitigation, and OWASP/CWE references. Implements idempotency via deterministic PR keys.
Configuration
Worker Output Example
Three-Phase Strategy
Alert clustering groups related issues (same file/type) to reduce PR volume and provide better review context.
Original prompt
💬 We'd love your input! Share your thoughts on Copilot coding agent in our 2 minute survey.