Skip to content

ci: add agnix validation to CI#8

Merged
avifenesh merged 2 commits intomainfrom
ci/add-agnix-validation
Mar 9, 2026
Merged

ci: add agnix validation to CI#8
avifenesh merged 2 commits intomainfrom
ci/add-agnix-validation

Conversation

@avifenesh
Copy link
Copy Markdown
Contributor

Summary

  • Add .agnix.toml configuration with repo-specific false positive suppressions
  • Add agnix validation job to CI pipeline via reusable ci-agnix.yml workflow
  • Validates agent configurations (CLAUDE.md, AGENTS.md, skills, hooks, MCP, plugins) on push and PR

Test plan

  • CI passes with agnix validation step
  • No false positive warnings in agnix output

Add .agnix.toml configuration and integrate the agnix GitHub Action
into CI to validate agent configurations on push and PR.
@chatgpt-codex-connector
Copy link
Copy Markdown

You have reached your Codex usage limits for code reviews. You can see your limits in the Codex usage dashboard.
To continue using code reviews, add credits to your account and enable them for code reviews in your settings.

@gemini-code-assist
Copy link
Copy Markdown

Summary of Changes

Hello, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request integrates agnix validation into the continuous integration pipeline. The primary goal is to automatically enforce coding standards and best practices for agent configurations, ensuring consistency and quality. It includes a new configuration file to manage specific rule suppressions relevant to this repository, preventing unnecessary warnings while maintaining robust validation.

Highlights

  • Agnix Configuration: Introduced a new .agnix.toml file to define repository-specific false positive suppressions for agnix validation.
  • CI Integration: Integrated agnix validation into the CI pipeline using a reusable workflow, ensuring agent configurations are checked automatically.
  • Validation Scope: Configured agnix to validate agent configurations, including CLAUDE.md, AGENTS.md, skills, hooks, MCP, and plugins, on every push and pull request.
Changelog
  • .agnix.toml
    • Added the initial configuration file for agnix.
    • Defined severity as "Warning" and exclude patterns for node_modules and .git.
    • Set target to "ClaudeCode" and locale to "en".
    • Disabled several specific rules (PE-001, PE-005, CC-MEM-005, CC-MEM-006, CC-MEM-008, CC-SK-017, XP-003, AS-014) with comments explaining the rationale for each suppression.
Ignored Files
  • Ignored by pattern: .github/workflows/** (1)
    • .github/workflows/ci.yml
Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for GitHub and other Google products, sign up here.

You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

Copy link
Copy Markdown

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request introduces agnix validation to the CI pipeline by adding a .agnix.toml configuration file. The configuration disables several rules that are considered false positives for this repository. My review includes a suggestion to improve the maintainability of the disabled rules list by sorting it and considering scoping the suppressions to specific files if the tool allows it.

Note: Security Review has been skipped due to the limited scope of the PR.

Comment on lines +9 to +18
disabled_rules = [
"PE-001", # Auto-generated CLAUDE.md - rule placement controlled by agent-core template
"PE-005", # "Be concise" is ecosystem-wide boilerplate from agent-core sync
"CC-MEM-005", # Same as PE-005 for Claude-specific rules
"CC-MEM-006", # Negative instructions (NEVER/Do not) are ecosystem standard critical rules
"CC-MEM-008", # Duplicate of PE-001 for Claude memory files
"CC-SK-017", # Intentional - version is a client-specific frontmatter field
"XP-003", # Intentional - lib/cross-platform/RESEARCH.md and commands document all platform paths
"AS-014", # False positive - Windows backslash in code example showing path handling
]
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

medium

For better maintainability, I have a couple of suggestions for this list of disabled rules:

  1. Sort the rules alphabetically: This makes the list easier to read and manage as it grows. I've provided a suggestion to apply this.

  2. Scope disabled rules: If agnix supports it, consider disabling rules for specific files or paths rather than globally. This is safer as it prevents unintentionally suppressing valid warnings in other files. For example, PE-001 could potentially be disabled only for CLAUDE.md.

Suggested change
disabled_rules = [
"PE-001", # Auto-generated CLAUDE.md - rule placement controlled by agent-core template
"PE-005", # "Be concise" is ecosystem-wide boilerplate from agent-core sync
"CC-MEM-005", # Same as PE-005 for Claude-specific rules
"CC-MEM-006", # Negative instructions (NEVER/Do not) are ecosystem standard critical rules
"CC-MEM-008", # Duplicate of PE-001 for Claude memory files
"CC-SK-017", # Intentional - version is a client-specific frontmatter field
"XP-003", # Intentional - lib/cross-platform/RESEARCH.md and commands document all platform paths
"AS-014", # False positive - Windows backslash in code example showing path handling
]
disabled_rules = [
"AS-014", # False positive - Windows backslash in code example showing path handling
"CC-MEM-005", # Same as PE-005 for Claude-specific rules
"CC-MEM-006", # Negative instructions (NEVER/Do not) are ecosystem standard critical rules
"CC-MEM-008", # Duplicate of PE-001 for Claude memory files
"CC-SK-017", # Intentional - version is a client-specific frontmatter field
"PE-001", # Auto-generated CLAUDE.md - rule placement controlled by agent-core template
"PE-005", # "Be concise" is ecosystem-wide boilerplate from agent-core sync
"XP-003", # Intentional - lib/cross-platform/RESEARCH.md and commands document all platform paths
]

@avifenesh avifenesh merged commit f220d3d into main Mar 9, 2026
3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant