Download Latest Version gh-aw-wasm-v0.68.3.tar.gz (4.9 MB)
Email in envelope

Get an email when there's a new version of GitHub Agentic Workflows

Home / v0.67.1
Name Modified Size InfoDownloads / Week
Parent folder
sbom.cdx.json 2026-04-06 3.2 MB
sbom.spdx.json 2026-04-06 5.5 MB
linux-arm64 2026-04-06 23.7 MB
windows-amd64.exe 2026-04-06 26.3 MB
windows-arm64.exe 2026-04-06 24.0 MB
freebsd-arm64 2026-04-06 23.6 MB
gh-aw-wasm-v0.67.1.tar.gz 2026-04-06 4.8 MB
linux-386 2026-04-06 24.7 MB
linux-amd64 2026-04-06 25.7 MB
linux-arm 2026-04-06 24.6 MB
android-arm64 2026-04-06 25.9 MB
checksums.txt 2026-04-06 1.0 kB
freebsd-amd64 2026-04-06 25.6 MB
darwin-amd64 2026-04-06 26.2 MB
darwin-arm64 2026-04-06 24.3 MB
freebsd-386 2026-04-06 24.5 MB
README.md 2026-04-06 14.1 kB
v0.67.1 source code.tar.gz 2026-04-06 239.6 MB
v0.67.1 source code.zip 2026-04-06 241.8 MB
Totals: 19 Items   794.0 MB 0

🌟 Release Highlights

This release delivers a major OpenTelemetry observability overhaul, a new report_incomplete safe output signal, Claude Code 1.0.0 compatibility, and a wave of security hardening — all driven in part by community-reported issues.

✨ What's New

🔭 OpenTelemetry Observability (Multiple PRs)

A substantial series of improvements makes distributed tracing production-ready:

  • Accurate span names — job lifecycle spans now use the actual job name (e.g. gh-aw.agent.conclusion) instead of the generic gh-aw.job.conclusion, making traces immediately readable in Grafana/Honeycomb/Datadog.
  • Real job duration — conclusion spans now record actual execution time (previously always reported 2–5 ms due to a missing startMs).
  • OTLP payload sanitization — sensitive values (token, secret, key, auth, etc.) in span attributes are automatically redacted before sending to any OTLP collector.
  • OTLP headers maskingOTEL_EXPORTER_OTLP_HEADERS is masked with ::add-mask:: in every job, preventing auth tokens from leaking in GitHub Actions debug logs.
  • MCP Gateway OpenTelemetry — the MCP Gateway now receives opentelemetry config derived from observability.otlp frontmatter and the actions/setup trace IDs, correlating all MCP tool-call traces under the workflow root trace.
  • New resource attributesservice.version, github.repository, github.run_id, github.event_name, github.ref, github.sha, github.actions.run_url, deployment.environment, gh-aw.staged, gh-aw.run.attempt enriching all spans.
  • Observability job summary auto-enabled — the job summary step is now rendered automatically whenever OTLP is configured; the observability.job-summary opt-in field is removed (auto-detected).
  • Real OTLP trace ID in the observability job summary (was incorrectly showing the workflow_call_id).
  • GitHub API rate limit analyticsgh aw audit, gh aw logs, and gh aw audit diff now show GitHub API quota consumed per run, per resource.

🛡️ report_incomplete Safe Output

A new first-class signal for agents to surface infrastructure or tool failures without being misclassified as successful runs. When an agent emits report_incomplete, the safe-outputs handler activates failure handling regardless of agent exit code — preventing "tool-failure comment disguised as a success" scenarios. Can be configured with create-issue, title-prefix, and labels, just like missing_tool.

checks as a First-Class MCP Tool

The checks tool is now registered in the gh-aw MCP server, returning a normalized CI verdict (success, failed, pending, no_checks, policy_blocked). Review workflows no longer need to shell out to gh aw checks.

🔐 Security Hardening

  • Token/secret injection prevention — 422 instances of $\{\{ secrets.* }} interpolated directly into run: blocks have been moved to env: mappings across 181 lock files and hand-authored CI workflows, preventing shell injection if a token contains metacharacters.
  • runner-guard added to static analysis — the static-analysis-report workflow now runs Vigilant-LLC's runner-guard scanner alongside zizmor, poutine, and actionlint.

🔍 Pre-Activation Visibility

When a workflow activation is denied (bot gate, role gate, stop-after, skip-if-match, etc.), the activation job now writes a $GITHUB_STEP_SUMMARY explaining the exact reason and providing remediation guidance — no more silently skipping PRs with no visible indicator.

🤖 Claude Code 1.0.0 Compatibility

The --disable-slash-commands flag has been removed from the Claude CLI args builder. Claude Code 1.0.0 dropped this flag as a breaking change; the compiler was unconditionally injecting it, causing all Claude-engine workflows to fail at startup.

🐛 Bug Fixes & Improvements

  • Fix Octokit .endpoint proxypre_activation check scripts were failing with route.endpoint is not a function due to the rate-limit-aware github proxy stripping Octokit's .endpoint decorator; fixed with a Proxy wrapper.
  • Fix OTLP span kind — job lifecycle spans now use SPAN_KIND_INTERNAL (was SPAN_KIND_SERVER), preventing false RED-metric pollution in observability backends.
  • Error message quality — duplicate permission scope hints suppressed, redundant path prefix stripped from single-failure messages, and YAML parse error fallbacks now emit proper IDE-navigable positions.
  • Fix daily-issues-report — switched from codex to copilot engine after OpenAI API access restrictions blocked Codex since Mar 24.
  • Fix runner-guard v2 module path — corrected go install path to include /v2/ suffix for Go major version convention compliance.
  • Fix docs breadcrumb config — removed unrecognized breadcrumbs: true key that was breaking Starlight config.
  • Add stateful scanning pattern to memory.md — documents the baseline-diff approach for nightly scans using repo-memory.

🌍 Community Contributions

A huge thank you to the community members who reported issues that were resolved in this release! ### `@bbonafed` - [Fix: Flexible import path resolution and cross-repo agent imports](https://github.com/github/gh-aw/issues/23900) _(direct issue)_ ### `@dagecko` - [CI/CD Security Hardening: Extract tokens and secrets from run blocks into env mappings](https://github.com/github/gh-aw/issues/24743) _(direct issue)_ ### `@samuelkahessay` - [gh-aw treats a comment-based review verdict as successful even when the agent only reported tool failures](https://github.com/github/gh-aw/issues/24756) _(direct issue)_ - [bot-gated PR review runs can disappear with no review check or surfaced skip reason](https://github.com/github/gh-aw/issues/24755) _(direct issue)_ - [gh-aw MCP server exposes 8 CLI tools but not `checks`, forcing review workflows to shell out to `gh aw checks`](https://github.com/github/gh-aw/issues/24754) _(direct issue)_

For complete details, see CHANGELOG.

Generated by Release · ● 1.2M


What's Changed

Full Changelog: https://github.com/github/gh-aw/compare/v0.67.0...v0.67.1

Source: README.md, updated 2026-04-06