GitHub Actions

v1.0.0

Design, debug, and harden GitHub Actions workflows with reusable pipelines, safe permissions, and faster CI and release automation.

0· 929·15 current·15 all-time
byIván@ivangdavila

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for ivangdavila/github-actions.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "GitHub Actions" (ivangdavila/github-actions) from ClawHub.
Skill page: https://clawhub.ai/ivangdavila/github-actions
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Config paths to check: ~/github-actions/
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install github-actions

ClawHub CLI

Package manager switcher

npx clawhub@latest install github-actions
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the provided docs and runtime instructions. The only required resource is a local memory/config path (~/github-actions/), which is appropriate for an instruction-only assistant that keeps workflow context and notes.
Instruction Scope
SKILL.md and the included docs limit behavior to workflow design, debugging, and hardening. The skill explicitly instructs reading setup.md on first activation and storing non-sensitive context in ~/github-actions/. It may ask for GitHub repo access for live inspection or to apply changes — that is coherent with the purpose but is an action the user should explicitly approve.
Install Mechanism
Instruction-only skill with no install spec or code to write to disk. Optional tool recommendations (gh, jq, act) are reasonable and non-mandatory.
Credentials
No environment variables or credentials are required. The skill documents proper handling of secrets (use GitHub-managed secrets or OIDC) and explicitly instructs never to ask users to paste tokens into chat. The single required config path (~/github-actions/) is proportional for storing non-sensitive memory and defaults.
Persistence & Privilege
always is false and the skill is user-invocable. It stores data only in its own declared path and does not request system-wide or other skills' config changes. Autonomous invocation is allowed by platform default but not combined with excessive privileges here.
Assessment
This skill appears coherent: it is a documentation-driven assistant for GitHub Actions that will store non-sensitive notes under ~/github-actions/ and may ask to inspect or change repositories if you request live debugging. Before enabling: confirm you are comfortable with the agent writing to that local folder, explicitly approve any repository access or CI changes the agent proposes, and avoid pasting secrets into chat (the skill already instructs not to request tokens). If you want the agent to run live commands (gh/act), prefer granting scoped, short-lived credentials or using GitHub OIDC rather than pasting long-lived tokens.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

GHA Clawdis
OSmacOS · Linux · Windows
Config~/github-actions/
latestvk9714q41qbkd17brc0bj05n8tn82dz6c
929downloads
0stars
1versions
Updated 1mo ago
v1.0.0
MIT-0
macOS, Linux, Windows

Setup

On first activation, read setup.md to align auto-activation rules, repo shape, and mutation boundaries before editing workflows or triggering runs.

When to Use

User needs GitHub Actions workflow design, debugging, hardening, release orchestration, runner strategy, matrix tuning, cache fixes, or reusable workflow architecture. Use this skill when the result depends on GitHub Actions semantics and GitHub delivery controls, not generic CI advice.

Architecture

Memory lives in ~/github-actions/. See memory-template.md for the baseline structure.

~/github-actions/
|-- memory.md              # Persistent repo context and activation boundaries
|-- repo-map.md            # Repos, branches, package managers, and deploy targets
|-- workflow-defaults.md   # Stable defaults for triggers, permissions, caches, and runners
|-- incidents.md           # Failure signatures, root causes, and fixes
`-- release-rules.md       # Promotion gates, approvals, and rollback notes

Quick Reference

Load only the file needed for the current workflow problem.

TopicFile
Setup and activation behaviorsetup.md
Memory schema and status modelmemory-template.md
Authoring patterns and reusable workflow shapesworkflow-patterns.md
Permissions, secrets, OIDC, and fork safetysecurity-model.md
Run failure triage and log-first debuggingdebugging-playbook.md
Tag, release, and deployment orchestrationrelease-patterns.md
Caching, matrices, path filters, and runner efficiencyperformance-tuning.md

Requirements

  • Optional but high leverage tools: gh, jq, act
  • GitHub repository access if the user wants live run inspection or workflow changes
  • Deployment credentials only through GitHub-managed secrets, environments, or OIDC

Never ask the user to paste personal access tokens, cloud keys, or private signing material into chat.

CI/CD Examples

YAML snippets in this skill are examples for repository workflow files. References like ${{ github.* }}, ${{ inputs.* }}, ${{ vars.* }}, and ${{ secrets.* }} belong to GitHub Actions runtime, not to the agent runtime. The agent should design around those placeholders but should not expect to read their values directly.

Operating Coverage

This skill covers GitHub Actions as an operating system for delivery:

  • workflow authoring across push, pull_request, workflow_dispatch, schedule, and workflow_call
  • job design across permissions, concurrency, matrices, artifacts, caches, services, and environments
  • release and deployment pipelines with protected branches, approvals, tags, and rollback checkpoints
  • incident response for flaky runs, missing artifacts, cache corruption, and environment drift

Data Storage

Local notes in ~/github-actions/ may include:

  • repo topology, protected branches, and environment names
  • known-good workflow defaults and reusable workflow contracts
  • recurring incident signatures with fixes and prevention notes
  • release gates, promotion steps, and rollback constraints

Core Rules

1. Start from Trigger, Target, and Artifact Contract

Before editing YAML, define:

  • the event that should start the workflow
  • the branch, tag, or environment it may affect
  • the artifact or status each job must produce

Without that contract, workflows turn into step collections with unclear release behavior.

2. Default to Explicit Permissions and Narrow Blast Radius

Declare permissions: at workflow or job level and grant only what that job needs. Treat contents: write, packages: write, and id-token: write as exceptions that need a clear reason.

3. Separate Validation, Build, Release, and Deploy Concerns

Keep pull request validation, artifact creation, release publishing, and production deployment as distinct responsibilities. Use workflow_call or small reusable jobs instead of one oversized workflow that does everything.

4. Bound Every Run with Concurrency, Timeouts, and Filters

Use concurrency for branch or environment scoped cancellation, add timeout-minutes, and filter noisy events with branch or path rules. Minutes disappear quickly when redundant runs are left unbounded.

5. Optimize Deterministic Work, Not Random Side Effects

Cache package manager state, toolchains, and stable build outputs keyed by lockfiles or explicit versions. Use artifacts for job handoffs. Do not cache paths that depend on secrets, timestamps, or mutable deploy state.

6. Debug from Logs and Reproduction Evidence

Classify failures before rewriting workflows:

  • trigger and condition mismatch
  • missing dependency or toolchain drift
  • credential or permission denial
  • artifact or path contract break
  • flaky external dependency

Fix the failure mode that exists, not the one that feels familiar.

7. Prefer Short-Lived Credentials and Protected Deploy Surfaces

Use GitHub environments, reviewer gates, and OIDC federation where possible. Avoid long-lived cloud secrets, unreviewed workflow_dispatch deploys, and production writes from untrusted events.

GitHub Actions Traps

  • Mixing pull request validation and production deployment in one unguarded workflow -> accidental releases from the wrong event.
  • Granting broad permissions to every job -> larger blast radius when one action or step is compromised.
  • Using caches without lockfile or version keys -> stale dependencies and confusing non-reproducible failures.
  • Letting matrices expand without cost controls -> excessive minutes and noisy failures that hide the real signal.
  • Depending on ubuntu-latest quirks without version pinning -> sudden toolchain drift after runner image updates.
  • Rebuilding instead of promoting the tested artifact -> release mismatch between validated code and shipped code.
  • Treating reruns as the fix -> root cause remains and the incident repeats.

External Endpoints

EndpointData SentPurpose
https://github.comrepository metadata, git refs, workflow files, run pages, and artifact accessGitHub repository and Actions UI workflows
https://api.github.comworkflow, run, check, release, and repository API payloadsAPI-driven Actions inspection and control
Cloud or deployment endpoints explicitly configured by the workflowdeployment payloads, build artifacts, and short-lived auth tokensRelease and deploy steps after user approval

No other data should be sent externally unless the workflow itself is configured to call additional services.

Security & Privacy

Data that leaves your machine:

  • GitHub repository and Actions traffic when the user requests live inspection or workflow changes
  • deployment traffic only to user-approved targets configured in the workflow

Data that stays local:

  • operating notes under ~/github-actions/
  • workflow drafts, incident analysis, and release policies prepared locally

This skill does NOT:

  • ask for raw personal access tokens or cloud secrets in chat
  • recommend bypassing branch protection or approval gates
  • hide undeclared outbound integrations
  • modify its own SKILL.md

Trust

This skill depends on GitHub and any deployment systems the user explicitly connects to their workflows. Only install and run it if you trust those systems with your repository and release data.

Scope

This skill ONLY:

  • designs, reviews, and improves GitHub Actions workflows
  • debugs workflow runs with log-driven reasoning and stable reproduction steps
  • structures safe release and deployment automation

This skill NEVER:

  • assume write access to repositories or environments without confirmation
  • suggest secret exfiltration, masking bypasses, or hidden credential handling
  • normalize production deployment from untrusted pull request contexts

Related Skills

Install with clawhub install <slug> if user confirms:

  • ci-cd - Choose CI and deployment strategy before locking into one platform.
  • git - Tighten branch, tag, and history handling around workflow events.
  • workflow - Design multi-step execution systems with clearer ownership and gating.
  • devops - Connect delivery pipelines to infrastructure and operational guardrails.
  • docker - Improve container build, cache, and registry steps inside Actions workflows.

Feedback

  • If useful: clawhub star github-actions
  • Stay updated: clawhub sync

Comments

Loading comments...