Skip to content

Comments

Fix SC1003: use double quotes for awf --allow-domains/--block-domains arguments; fix playwright --no-sandbox arg#17861

Merged
pelikhan merged 6 commits intomainfrom
copilot/fix-allow-domains-quotes
Feb 23, 2026
Merged

Fix SC1003: use double quotes for awf --allow-domains/--block-domains arguments; fix playwright --no-sandbox arg#17861
pelikhan merged 6 commits intomainfrom
copilot/fix-allow-domains-quotes

Conversation

Copy link
Contributor

Copilot AI commented Feb 23, 2026

ShellCheck SC1003 was firing 156 times across compiled workflow lock files because the compiler wrapped domain lists containing wildcards (e.g. *.githubusercontent.com) in single quotes. Double quotes suppress glob expansion equally well and are SC1003-clean.

Changes

  • pkg/workflow/shell.go — Added shellDoubleQuoteArg helper that safely escapes \, ", $, and ` before wrapping in double quotes, preventing unintended shell expansion while fixing SC1003.
  • pkg/workflow/awf_helpers.go — Use shellDoubleQuoteArg for --allow-domains and --block-domains values instead of naive string concatenation.
  • pkg/workflow/mcp_config_playwright_renderer.go — Replaced --browser-arg --no-sandbox with the direct --no-sandbox flag, which is the correct interface in @playwright/mcp v0.0.26+.
  • pkg/workflow/testdata/wasm_golden/.../*.golden — Updated 3 golden files to expect double-quoted domain lists and updated playwright entrypoint args.
  • .github/workflows/*.lock.yml — All 158 lock files recompiled; zero single-quoted domain lists remain and --browser-arg is removed from all playwright configurations.
-awfArgs = append(awfArgs, "--allow-domains", config.AllowedDomains)
+// Use double-quoted form via shellDoubleQuoteArg so wildcards like *.domain.com are
+// treated as plain arguments, fixing SC1003, while escaping $, `, \, and " to
+// prevent unintended shell expansion.
+awfArgs = append(awfArgs, "--allow-domains", shellDoubleQuoteArg(config.AllowedDomains))

Before → --allow-domains '*.githubusercontent.com,api.github.com,...'
After → --allow-domains "*.githubusercontent.com,api.github.com,..."

Original prompt

This section details on the original issue you should resolve

<issue_title>[plan] Fix SC1003: Switch awf --allow-domains from single to double quotes in 23 workflow source files</issue_title>
<issue_description>## Objective

Fix the 156 ShellCheck SC1003 occurrences across 23 workflow source files by replacing single-quoted domain lists with double-quoted strings in awf --allow-domains arguments.

Context

From static analysis discussion #17844: The daily static analysis scan reports 156 shellcheck:SC1003 findings (info severity) across 23 agentic workflows. ShellCheck warns because single-quoted strings can mask escape sequences. Double-quoting domain lists is the correct fix since wildcards like *.githubusercontent.com are command arguments, not shell globs.

Approach

  1. Find all .md source files in .github/workflows/ that use awf --allow-domains '...'
  2. Replace single-quoted domain lists with double-quoted strings: '*.domain.com,...'"*.domain.com,..."
  3. After fixing all 23 files, run make recompile to regenerate .lock.yml files
  4. Verify the SC1003 count drops to 0 with actionlint .github/workflows/*.lock.yml

Files to Modify (source .md files only)

  • .github/workflows/copilot-cli-deep-research.md
  • .github/workflows/daily-compiler-quality.md
  • .github/workflows/daily-doc-updater.md
  • .github/workflows/daily-file-diet.md
  • .github/workflows/daily-mcp-concurrency-analysis.md
  • .github/workflows/daily-syntax-error-quality.md
  • .github/workflows/daily-testify-uber-super-expert.md
  • .github/workflows/delight.md
  • .github/workflows/developer-docs-consolidator.md
  • .github/workflows/discussion-task-miner.md
  • .github/workflows/glossary-maintainer.md
  • .github/workflows/go-fan.md
  • .github/workflows/go-logger.md
  • .github/workflows/instructions-janitor.md
  • .github/workflows/layout-spec-maintainer.md
  • .github/workflows/semantic-function-refactor.md
  • .github/workflows/sergo.md
  • .github/workflows/step-name-alignment.md
  • .github/workflows/typist.md
  • .github/workflows/ubuntu-image-analyzer.md
  • .github/workflows/unbloat-docs.md
  • .github/workflows/workflow-skill-extractor.md
  • .github/workflows/ci-doctor.md

Example Fix

# Before (triggers SC1003):
run: |
  sudo -E awf --allow-domains '*.githubusercontent.com,api.github.com,models.github.com' \
    --other-flags

# After (correct):
run: |
  sudo -E awf --allow-domains "*.githubusercontent.com,api.github.com,models.github.com" \
    --other-flags

IMPORTANT: Fix .md source files only. Run make recompile after all fixes to regenerate .lock.yml files. Run make agent-finish before committing.

Acceptance Criteria

  • All 23 .md files updated to use double-quoted domain lists
  • make recompile runs without errors
  • make agent-finish passes (build + test + lint)
  • SC1003 count drops to 0 in actionlint output

Generated by Plan Command for issue #discussion #17844

  • expires on Feb 25, 2026, 7:18 AM UTC

Comments on the Issue (you are @copilot in this section)


🔒 GitHub Advanced Security automatically protects Copilot coding agent pull requests. You can protect all pull requests by enabling Advanced Security for your repositories. Learn more about Advanced Security.


Changeset

  • Type: patch
  • Description: Double-quote AWF domain list arguments so SC1003 no longer flags --allow-domains/--block-domains

Generated by Changeset Generator for issue #17861

Warning

⚠️ Firewall blocked 2 domains

The following domains were blocked by the firewall during workflow execution:

  • codeload.github.com
  • github.com


✨ PR Review Safe Output Test - Run 22303636093

💥 [THE END] — Illustrated by Smoke Claude


Changeset

  • Type: patch
  • Description: Double-quote AWF domain allow/block arguments and escape special characters so compiled workflows stop triggering ShellCheck SC1003 and Playwright arguments use the proper --no-sandbox flag.

Generated by Changeset Generator for issue #17861

Warning

⚠️ Firewall blocked 1 domain

The following domain was blocked by the firewall during workflow execution:

  • github.com


✨ PR Review Safe Output Test - Run 22304444078

💥 [THE END] — Illustrated by Smoke Claude

…ains arguments

Co-authored-by: pelikhan <4175913+pelikhan@users.noreply.github.com>
Copilot AI changed the title [WIP] Fix SC1003 by changing single to double quotes in workflow files Fix SC1003: use double quotes for awf --allow-domains/--block-domains arguments Feb 23, 2026
@pelikhan pelikhan marked this pull request as ready for review February 23, 2026 11:11
Copilot AI review requested due to automatic review settings February 23, 2026 11:11
@pelikhan pelikhan added the smoke label Feb 23, 2026
@github-actions
Copy link
Contributor

📰 BREAKING: Smoke Copilot is now investigating this pull request. Sources say the story is developing...

@github-actions
Copy link
Contributor

github-actions bot commented Feb 23, 2026

✨ The prophecy is fulfilled... Smoke Codex has completed its mystical journey. The stars align. 🌟

@github-actions
Copy link
Contributor

github-actions bot commented Feb 23, 2026

🎬 THE ENDSmoke Claude MISSION: ACCOMPLISHED! The hero saves the day! ✨

Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Updates AWF command rendering to use double-quoted --allow-domains/--block-domains argument values so generated workflow run: scripts are ShellCheck SC1003-clean (notably for wildcard domains like *.githubusercontent.com), and recompiles affected golden + lock outputs accordingly.

Changes:

  • Adjust BuildAWFArgs to pre-wrap allow/block domain lists in double quotes so shellEscapeArg preserves them.
  • Update WASM golden fixtures to expect double-quoted domain lists.
  • Recompile GitHub Actions workflow lock files to remove single-quoted domain lists.

Reviewed changes

Copilot reviewed 162 out of 162 changed files in this pull request and generated 1 comment.

File Description
pkg/workflow/awf_helpers.go Pre-wraps --allow-domains / --block-domains values in double quotes when building AWF args.
pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/basic-copilot.golden Updates expected compiled output to include double-quoted --allow-domains list.
pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/with-imports.golden Updates expected compiled output to include double-quoted --allow-domains list.
.github/workflows/*.lock.yml (many files) Recompiled lock workflows reflecting the updated quoting for --allow-domains.
Comments suppressed due to low confidence (1)

pkg/workflow/awf_helpers.go:163

  • Same concern for blockedDomains: unlike network.allowed, blocked domains are commonly user-specified and may not be run through the same domain-pattern validation. Pre-quoting with double quotes means values like $(...) or $VAR would be expanded by the shell in compiled workflows. Please either validate blocked domains with the same strict domain-pattern rules (rejecting $/backticks/etc.) or use a safe double-quoting helper that escapes expansion-sensitive characters instead of bypassing shellEscapeArg.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment on lines 155 to 157
// Pre-wrap in double quotes so shellEscapeArg preserves them (wildcards like *.domain.com
// are command arguments, not shell globs, and double quotes prevent SC1003 ShellCheck warnings)
awfArgs = append(awfArgs, "--allow-domains", "\""+config.AllowedDomains+"\"")
Copy link

Copilot AI Feb 23, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Wrapping the domain list in double quotes here bypasses shellEscapeArg’s escaping logic (it short-circuits on pre-quoted strings). If AllowedDomains ever contains $, backticks, or backslashes, double quotes will allow shell expansion/command substitution in the generated run: script. Consider keeping AllowedDomains unquoted and instead teaching shellEscapeArg (or a dedicated helper used here) to emit a safely-escaped double-quoted form for domain lists (escaping at least \, ", $, and `) so you fix SC1003 without weakening shell-safety.

This issue also appears on line 161 of the same file.

Copilot uses AI. Check for mistakes.
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good catch. Added a shellDoubleQuoteArg helper to shell.go (commit 95170df) that escapes \, ", $, and ` before wrapping in double quotes — the same escape sequence used by shellEscapeCommandString. awf_helpers.go now uses this helper instead of naive string concatenation, so values containing those characters can't trigger shell expansion.

@github-actions
Copy link
Contributor

Smoke test results:
PRs: #17877 [docs] Update glossary - weekly full scan; #17860 [specs] Update layout specification - 2026-02-23
GitHub MCP: ✅
Serena MCP: ✅
Playwright: ❌ (tool missing)
Web fetch: ✅
File write: ✅
Bash cat: ✅
Build: ✅
Overall: FAIL

🔮 The oracle has spoken through Smoke Codex

@github-actions
Copy link
Contributor

Smoke Test Results for run §22303636050

Test Status
GitHub MCP
Safe Inputs GH CLI
Serena MCP ⚠️ n/a
Playwright ⚠️ n/a
Web Fetch
File Writing
Bash Tool
Discussion Interaction
Build gh-aw
Discussion Creation
Workflow Dispatch
PR Review

Overall: PASS ✅@pelikhan

📰 BREAKING: Report filed by Smoke Copilot

Copy link
Contributor

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This PR applies a systematic fix for SC1003 shellcheck warnings by wrapping --allow-domains argument values in double quotes across all lock files. The change is correct and consistent — it ensures shell word-splitting doesn't occur on domain lists that contain wildcard characters like *. No logic changes, purely a quoting fix.

📰 BREAKING: Report filed by Smoke Copilot

@github-actions
Copy link
Contributor

📰 VERDICT: Smoke Copilot has concluded. All systems operational. This is a developing story. 🎤

@github-actions
Copy link
Contributor

Commit pushed: b7aa4be

@github-actions
Copy link
Contributor

Commit pushed: b8248dd

@github-actions
Copy link
Contributor

Smoke Test Results — Run §22303636093 — Overall: PARTIAL

Core (#1–10): ✅✅✅✅❌✅✅✅✅✅
PR Review (#11–17): ✅✅✅✅✅✅⚠️

❌ Test 5 (Playwright MCP): mcp__playwright__* tools not available in agent env
⚠️ Test 17 (Close PR): skipped — no safe test PR to close

💥 [THE END] — Illustrated by Smoke Claude

Copy link
Contributor

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💥 Automated smoke test review - all systems nominal!

💥 [THE END] — Illustrated by Smoke Claude

@pelikhan
Copy link
Contributor

@copilot fix playwright arguments

  [2026-02-23T11:13:26Z] [INFO] [backend] [stderr] error: unknown option '--browser-arg'

…ains, remove --browser-arg

Co-authored-by: pelikhan <4175913+pelikhan@users.noreply.github.com>
Copy link
Contributor Author

Copilot AI commented Feb 23, 2026

@copilot fix playwright arguments

...

Fixed in commit 95170df. @playwright/mcp now exposes --no-sandbox as a direct top-level flag; --browser-arg --no-sandbox is no longer valid. Updated mcp_config_playwright_renderer.go and recompiled all lock files.

Warning

Firewall rules blocked me from connecting to one or more addresses (expand for details)

I tried to connect to the following addresses, but was blocked by firewall rules:

  • https://api.github.com/graphql
    • Triggering command: /usr/bin/gh /usr/bin/gh api graphql -f query=query($owner: String!, $name: String!) { repository(owner: $owner, name: $name) { hasDiscussionsEnabled } } -f owner=github -f name=gh-aw --64 -o x_amd64/vet ut-2�� 64/src/net -I x_amd64/vet ctor --64 E=3 x_amd64/vet (http block)
    • Triggering command: /usr/bin/gh /usr/bin/gh api graphql -f query=query($owner: String!, $name: String!) { repository(owner: $owner, name: $name) { hasDiscussionsEnabled } } -f owner=github -f name=gh-aw --64 5899998/b132/ x_amd64/vet go_.�� ache/go/1.25.0/x64/src/os/user 64/src/net x_amd64/vet --gdwarf-5 --64 ut-60918413.c x_amd64/vet (http block)
    • Triggering command: /usr/bin/gh /usr/bin/gh api graphql -f query=query($owner: String!, $name: String!) { repository(owner: $owner, name: $name) { hasDiscussionsEnabled } } -f owner=github -f name=gh-aw --64 (http block)
  • https://api.github.com/repos/actions/ai-inference/git/ref/tags/v1
    • Triggering command: /usr/bin/gh gh api /repos/actions/ai-inference/git/ref/tags/v1 --jq .object.sha k/gh-aw/gh-aw/.github/workflows -tests n-dir/sh l -trimpath ed } } git -C .js&#39; --ignore-path .prettierignore rev-parse tions/setup/js/node_modules/.bin/node /opt/hostedtoolcgit 5899998/b132/ x_amd64/vet git (http block)
  • https://api.github.com/repos/actions/checkout/git/ref/tags/11bd71901bbe5b1630ceea73d27597364c9af683
    • Triggering command: /usr/bin/gh gh api /repos/actions/checkout/git/ref/tags/11bd71901bbe5b1630ceea73d27597364c9af683 --jq .object.sha s .cfg $name) { hasDiscussionsEnabled } } 8SD_/5SHL-DMwr-wgit crypto/internal/-C -lang=go1.25 x_amd64/vet 5899�� 5899998/b267/_pkremote.origin.url .cfg x_amd64/vet . i/ansi --64 x_amd64/vet (http block)
  • https://api.github.com/repos/actions/checkout/git/ref/tags/v3
    • Triggering command: /usr/bin/gh gh api /repos/actions/checkout/git/ref/tags/v3 --jq .object.sha js/**/*.json&#39; --ignore-path ../../../.prettierignore -buildtags repository(owner: $owner, name: $name) { hasDiscussionsEnabled } } -errorsas -ifaceassert -nilfunc /opt/hostedtoolcache/go/1.25.0/x64/pkg/tool/linuconfig -o /tmp/go-build3707428337/b346/_pkg_.a -trimpath me: String!) { repository(owner: $owner, name: $name) { hasDiscussionsEnabled } } -p github.com/stretrev-parse -lang=go1.17 /opt/hostedtoolcache/go/1.25.0/x--write (http block)
  • https://api.github.com/repos/actions/checkout/git/ref/tags/v4
    • Triggering command: /usr/bin/gh gh api /repos/actions/checkout/git/ref/tags/v4 --jq .object.sha ../pkg/workflow/js/**/*.json&#39; ---errorsas 7428337/b001/_testmain.go er: String!, $name: String!) { -nilfunc 64/src/os/user (http block)
    • Triggering command: /usr/bin/gh gh api /repos/actions/checkout/git/ref/tags/v4 --jq .object.sha ../pkg/workflow/js/**/*.json&#39; --ignore-path ../../../.prettierignore /tmp/go-build3707428337/b073/vet.cfg 0/x64/bin/bash 64/src/os/user ache/go/1.25.0/xrev-parse x_amd64/compile git rev-�� k/gh-aw/gh-aw/.github/workflows x_amd64/compile ules/.bin/node ache/go/1.25.0/xgit _cgo_.o DiscussionsEnabl--show-toplevel git (http block)
    • Triggering command: /usr/bin/gh gh api /repos/actions/checkout/git/ref/tags/v4 --jq .object.sha /home/REDACTED/work/gh-aw/gh-aw/.github/workflows config /home/REDACTED/work/gh-aw/gh-aw/actions/node_modules/.bin/node remote.origin.urgit /libexec/gcc/x86rev-parse x_amd64/vet node /opt�� prettier --write /opt/hostedtoolcache/node/24.13.0/x64/bin/node **/*.ts **/*.json --ignore-path node (http block)
  • https://api.github.com/repos/actions/checkout/git/ref/tags/v5
    • Triggering command: /usr/bin/gh gh api /repos/actions/checkout/git/ref/tags/v5 --jq .object.sha 0 -j ACCEPT U5AI86QgQCBKY07Dsh -goversion go1.25.0 ache/go/1.25.0/x64/pkg/tool/linu-f /pre�� se 7428337/b035/vet.cfg .cfg 64/src/runtime/ciptables (http block)
    • Triggering command: /usr/bin/gh gh api /repos/actions/checkout/git/ref/tags/v5 --jq .object.sha *.json&#39; &#39;!../../../pkg/workflow/js/**/*.json&#39; --ignore-path ../../../.prettierignore --jq ache/go/1.25.0/x64/bin/bash l -fPIC x_amd64/vet infocmp -1 xterm-color x_amd64/vet k/gh-aw/gh-aw/node_modules/.bin/node g_.a 5899998/b135/imprev-parse x_amd64/vet git (http block)
    • Triggering command: /usr/bin/gh gh api /repos/actions/checkout/git/ref/tags/v5 --jq .object.sha npx prettier --write &#39;**/*.cjs&#39; &#39;**/*.ts&#39; &#39;**/*.json&#39; --ignore-path ../../../.pr**/*.json x_amd64/vet /home/REDACTED/go/bin/sh 5899998/b333/_pkgit /tmp/go-build241rev-parse x_amd64/asm sh -c &#34;prettier&#34; --write &#39;scripts/**/*.js&#39; --ignore-path .prettierignore x_amd64/asm /home/REDACTED/work/gh-aw/gh-aw/actions/node_modules/.bin/node tierignore 5899998/b102/vetrev-parse 64/pkg/tool/linu--show-toplevel node (http block)
  • https://api.github.com/repos/actions/checkout/git/ref/tags/v6
    • Triggering command: /usr/bin/gh gh api /repos/actions/checkout/git/ref/tags/v6 --jq .object.sha ire/doc.go ire/forward_requirements.go x_amd64/vet --gdwarf-5 --64 -o x_amd64/vet 5899�� ache/go/1.25.0/x64/src/net .cfg x_amd64/vet -c -I /tmp/go-build241graphql x_amd64/vet (http block)
  • https://api.github.com/repos/actions/github-script/git/ref/tags/v7
    • Triggering command: /usr/bin/gh gh api /repos/actions/github-script/git/ref/tags/v7 --jq .object.sha /tmp/go-build2415899998/b034/_pkg_.a 5899998/b132/ x_amd64/vet -p internal/filepat-atomic (http block)
    • Triggering command: /usr/bin/gh gh api /repos/actions/github-script/git/ref/tags/v7 --jq .object.sha /opt/hostedtoolc-errorsas 5899998/b132/ x_amd64/vet --gdwarf-5 --64 -o x_amd64/vet go_.�� 64/src/net ortcfg x_amd64/compile --gdwarf-5 --64 -o x_amd64/compile (http block)
    • Triggering command: /usr/bin/gh gh api /repos/actions/github-script/git/ref/tags/v7 --jq .object.sha ache/go/1.25.0/x64/src/net .cfg x_amd64/vet . ions =0 x_amd64/vet swit�� ache/go/1.25.0/x64/src/net 5899998/b222/ r: $owner, name: $name) { hasDiscussionsEnabled } } -p ions =0 x_amd64/vet (http block)
  • https://api.github.com/repos/actions/github-script/git/ref/tags/v8
    • Triggering command: /usr/bin/gh gh api /repos/actions/github-script/git/ref/tags/v8 --jq .object.sha ../pkg/workflow/js/**/*.json&#39; --ignore-path ../../../.prettierignore /tmp/go-build3707428337/b173/vet.cfg /usr/bin/git 64/src/os/user (http block)
    • Triggering command: /usr/bin/gh gh api /repos/actions/github-script/git/ref/tags/v8 --jq .object.sha ../pkg/workflow/js/**/*.json&#39; --ignore-path ../../../.prettierignore -buildtags /usr/bin/git l -ifaceassert DiscussionsEnabl--show-toplevel git rev-�� k/gh-aw/gh-aw/.github/workflows -tests ode g_.a -trimpath x_amd64/vet infocmp (http block)
    • Triggering command: /usr/bin/gh gh api /repos/actions/github-script/git/ref/tags/v8 --jq .object.sha /home/REDACTED/work/gh-aw/gh-aw/.github/workflows config /home/REDACTED/work/gh-aw/node_modules/.bin/node remote.origin.urgit -trimpath x_amd64/vet node /opt�� prettier --write /bin/sh **/*.ts **/*.json --ignore-path /bin/sh (http block)
  • https://api.github.com/repos/actions/setup-go/git/ref/tags/4dc6199c7b1a012772edbd06daecab0f50c9053c
    • Triggering command: /usr/bin/gh gh api /repos/actions/setup-go/git/ref/tags/4dc6199c7b1a012772edbd06daecab0f50c9053c --jq .object.sha ache/go/1.25.0/xremote.origin.url 5899998/b170/importcfg x_amd64/vet . --gdwarf2 --64 x_amd64/vet -p ache/go/1.25.0/xremote.origin.url -trimpath x_amd64/vet -I /tmp/go-build241-C -I x_amd64/vet (http block)
  • https://api.github.com/repos/actions/setup-go/git/ref/tags/v4
    • Triggering command: /usr/bin/gh gh api /repos/actions/setup-go/git/ref/tags/v4 --jq .object.sha ../pkg/workflow/js/**/*.json&#39; --ignore-path ../../../.prettierignore ml n-dir/bash 64/src/os/user (http block)
  • https://api.github.com/repos/actions/setup-go/git/ref/tags/v5
    • Triggering command: /usr/bin/gh gh api /repos/actions/setup-go/git/ref/tags/v5 --jq .object.sha g_.a --debug-prefix-m-ifaceassert 64/pkg/tool/linu-nilfunc -I re/v2 -I 64/pkg/tool/linulog -o /tmp/go-build241--format=%H:%ct .cfg x_amd64/vet 1cAs/_DyLGmUK_amgit crypto/internal/-C -lang=go1.25 x_amd64/vet (http block)
    • Triggering command: /usr/bin/gh gh api /repos/actions/setup-go/git/ref/tags/v5 --jq .object.sha g_.a --debug-prefix-m-ifaceassert 64/pkg/tool/linu-nilfunc -I /opt/hostedtoolc-c -I 64/pkg/tool/linulog -p crypto/internal/-n1 .cfg x_amd64/vet DA6R26DHp /tmp/go-build241-C 5899998/b222/ x_amd64/vet (http block)
  • https://api.github.com/repos/actions/setup-go/git/ref/tags/v6
    • Triggering command: /usr/bin/gh gh api /repos/actions/setup-go/git/ref/tags/v6 --jq .object.sha 02.o -I x_amd64/vet --gdwarf-5 --64 -o x_amd64/vet go_.�� 64/src/net ache/go/1.25.0/x64/src/os/user x_amd64/vet 5899998/b132/ --64 (http block)
    • Triggering command: /usr/bin/gh gh api /repos/actions/setup-go/git/ref/tags/v6 --jq .object.sha /opt/hostedtoolc-errorsas 5899998/b132/ x_amd64/vet --gdwarf-5 --64 -o x_amd64/vet go_.�� 64/src/net -I 64/pkg/tool/linu-nilfunc --gdwarf-5 /go-isatty -o 64/pkg/tool/linu-tests (http block)
    • Triggering command: /usr/bin/gh gh api /repos/actions/setup-go/git/ref/tags/v6 --jq .object.sha /opt/hostedtoolc-errorsas 5899998/b132/ x_amd64/vet --gdwarf-5 --64 -o x_amd64/vet go_.�� 64/src/net -I 64/pkg/tool/linu-nilfunc --gdwarf-5 b/gh-aw/pkg/file--norc -o 64/pkg/tool/linu-tests (http block)
  • https://api.github.com/repos/actions/setup-node/git/ref/tags/v4
    • Triggering command: /usr/bin/gh gh api /repos/actions/setup-node/git/ref/tags/v4 --jq .object.sha ../pkg/workflow/js/**/*.json&#39; --ignore-path ../../../.prettierignore /tmp/go-build3707428337/b236/vet.cfg /opt/hostedtoolcache/go/1.25.0/x64/pkg/tool/linu-f ual_fold_amd64.sgit lid_amd64.s x_amd64/compile /opt/hostedtoolcache/go/1.25.0/x64/pkg/tool/linux_amd64/vet -ato�� k/gh-aw/gh-aw/.github/workflows nce-analyzer.lock.yml explorer.lock.yml ock.yml l ary.lock.yml s.lock.yml (http block)
  • https://api.github.com/repos/actions/setup-node/git/ref/tags/v6
    • Triggering command: /usr/bin/gh gh api /repos/actions/setup-node/git/ref/tags/v6 --jq .object.sha 5899998/b109/_pk-errorsas 5899998/b003/imp-ifaceassert x_amd64/vet -p io/fs -lang=go1.25 x_amd64/vet go_.�� 64/src/net -I x_amd64/vet EoTS/NWHPP78zvf0/opt/hostedtoolcache/go/1.25.0/x64/pkg/tool/linux_amd64/vet o-gh/v2 -o x_amd64/vet (http block)
    • Triggering command: /usr/bin/gh gh api /repos/actions/setup-node/git/ref/tags/v6 --jq .object.sha /opt/hostedtoolc-errorsas 5899998/b132/ x_amd64/vet --gdwarf-5 --64 -o x_amd64/vet go_.�� 64/src/net -I 64/pkg/tool/linu-nilfunc --gdwarf-5 b-eyer/go-colorf--norc -o 64/pkg/tool/linu-tests (http block)
    • Triggering command: /usr/bin/gh gh api /repos/actions/setup-node/git/ref/tags/v6 --jq .object.sha ache/go/1.25.0/x64/src/net .cfg x_amd64/vet --gdwarf-5 --64 ut-2329372355.c x_amd64/vet -o 5899998/b273/_pkg_.a -trimpath ache/go/1.25.0/x64/pkg/tool/linu-nilfunc -p bracelet/bubbles/opt/hostedtoolcache/node/24.13.0/x64/bin/npm -lang=go1.25 ache/go/1.25.0/x@sentry/mcp-server@0.29.0 (http block)
  • https://api.github.com/repos/anchore/sbom-action/git/ref/tags/v0
    • Triggering command: /usr/bin/gh gh api /repos/anchore/sbom-action/git/ref/tags/v0 --jq .object.sha -I .cfg x_amd64/vet . ut-2366738919.c --64 x_amd64/vet 5899�� ache/go/1.25.0/x64/src/net -trimpath r: $owner, name: $name) { hasDiscussionsEnabled } } -p github.com/cli/g-C -lang=go1.25 x_amd64/vet (http block)
    • Triggering command: /usr/bin/gh gh api /repos/anchore/sbom-action/git/ref/tags/v0 --jq .object.sha ache/go/1.25.0/xremote.origin.url .cfg x_amd64/vet -c -I /tmp/go-build241xterm-color x_amd64/vet -p ache/go/1.25.0/x64/src/net -trimpath x_amd64/vet -I /tmp/go-build241-C -I x_amd64/vet (http block)
  • https://api.github.com/repos/astral-sh/setup-uv/git/ref/tags/eac588ad8def6316056a12d4907a9d4d84ff7a3b
    • Triggering command: /usr/bin/gh gh api /repos/astral-sh/setup-uv/git/ref/tags/eac588ad8def6316056a12d4907a9d4d84ff7a3b --jq .object.sha @v1.1.3/ascii/equal_fold_amd64.s-errorsas @v1.1.3/ascii/valid_amd64.s x_amd64/vet --gdwarf-5 --64 -o x_amd64/vet -I g_.a -I x_amd64/vet 5899998/b222/ --64 ctor x_amd64/vet (http block)
  • https://api.github.com/repos/docker/build-push-action/git/ref/tags/v6
    • Triggering command: /usr/bin/gh gh api /repos/docker/build-push-action/git/ref/tags/v6 --jq .object.sha -I .cfg x_amd64/vet y-7c/fjvQSo6B9Fpgit --gdwarf2 --64 x_amd64/vet 5899�� ache/go/1.25.0/xremote.origin.url -trimpath x_amd64/vet -p archive/tar -lang=go1.25 x_amd64/vet (http block)
    • Triggering command: /usr/bin/gh gh api /repos/docker/build-push-action/git/ref/tags/v6 --jq .object.sha -I .cfg x_amd64/vet . --gdwarf2 --64 x_amd64/vet 5899�� ache/go/1.25.0/xremote.origin.url -trimpath x_amd64/vet -p net/url -lang=go1.25 x_amd64/vet (http block)
  • https://api.github.com/repos/docker/login-action/git/ref/tags/v3
    • Triggering command: /usr/bin/gh gh api /repos/docker/login-action/git/ref/tags/v3 --jq .object.sha -I .cfg x_amd64/vet . --gdwarf2 --64 x_amd64/vet 5899�� ache/go/1.25.0/xremote.origin.url 5899998/b258/importcfg x_amd64/vet -p database/sql/driapi -lang=go1.25 x_amd64/vet (http block)
    • Triggering command: /usr/bin/gh gh api /repos/docker/login-action/git/ref/tags/v3 --jq .object.sha ache/go/1.25.0/x64/src/net -trimpath x_amd64/vet -p encoding/hex -lang=go1.25 x_amd64/vet -o ache/go/1.25.0/xremote.origin.url -trimpath r: $owner, name: $name) { hasDiscussionsEnabled } } -p github.com/cli/gapi -lang=go1.25 x_amd64/vet (http block)
  • https://api.github.com/repos/docker/metadata-action/git/ref/tags/v5
    • Triggering command: /usr/bin/gh gh api /repos/docker/metadata-action/git/ref/tags/v5 --jq .object.sha -I 5899998/b222/ x_amd64/vet . --gdwarf2 --64 x_amd64/vet 5899�� ache/go/1.25.0/x64/src/net -trimpath r: $owner, name: $name) { hasDiscussionsEnabled } } -p testing/internal-C -lang=go1.25 x_amd64/vet (http block)
    • Triggering command: /usr/bin/gh gh api /repos/docker/metadata-action/git/ref/tags/v5 --jq .object.sha ache/go/1.25.0/xremote.origin.url 5899998/b153/importcfg x_amd64/vet . -imultiarch x86_64-linux-gnuxterm-color x_amd64/vet -o ache/go/1.25.0/x64/src/net -trimpath x_amd64/vet -p text/template -lang=go1.25 x_amd64/vet (http block)
  • https://api.github.com/repos/docker/setup-buildx-action/git/ref/tags/v3
    • Triggering command: /usr/bin/gh gh api /repos/docker/setup-buildx-action/git/ref/tags/v3 --jq .object.sha -I .cfg x_amd64/vet . --gdwarf2 --64 x_amd64/vet 5899�� ache/go/1.25.0/x64/src/net ortcfg r: $owner, name: $name) { hasDiscussionsEnabled } } -p os/user -lang=go1.25 x_amd64/vet (http block)
    • Triggering command: /usr/bin/gh gh api /repos/docker/setup-buildx-action/git/ref/tags/v3 --jq .object.sha ache/go/1.25.0/x64/src/net /tmp/go-build2415899998/b132/ x_amd64/vet . --gdwarf2 --64 x_amd64/vet -o ache/go/1.25.0/xremote.origin.url -trimpath r: $owner, name: $name) { hasDiscussionsEnabled } } -p crypto/aes -lang=go1.25 x_amd64/vet (http block)
  • https://api.github.com/repos/github/gh-aw/git/ref/tags/a70c5eada06553e3510ac27f2c3bda9d3705bccb
    • Triggering command: /usr/bin/gh gh api /repos/github/gh-aw/git/ref/tags/a70c5eada06553e3510ac27f2c3bda9d3705bccb --jq .object.sha 64/src/net -fPIC x_amd64/vet -pthread -Wl,--no-gc-sectrev-parse -fmessage-length--show-toplevel x_amd64/vet -I g_.a 5899998/b135/importcfg x_amd64/vet --gdwarf-5 on -o x_amd64/vet (http block)
  • https://api.github.com/repos/github/gh-aw/git/ref/tags/v1.0.0
    • Triggering command: /usr/bin/gh gh api /repos/github/gh-aw/git/ref/tags/v1.0.0 --jq .object.sha ignore-path ../../../.prettierignore -trimpath repository(owner: $owner, name:-f -p github.com/githu-c -lang=go1.25 ache/go/1.25.0/x64/pkg/tool/linuconfig -uns�� -unreachable=false /tmp/go-build2415899998/b049/vet.cfg .cfg -goversion go1.25.0 -c=4 ache/go/1.25.0/x--write (http block)
  • https://api.github.com/repos/githubnext/agentics/git/ref/tags/
    • Triggering command: /usr/bin/gh gh api /repos/githubnext/agentics/git/ref/tags/# --jq .object.sha g_.a 5899998/b074/imp-ifaceassert 64/pkg/tool/linu-nilfunc /tmp/go-build241git jsonschema x86_64-linux-gnu--show-toplevel 64/pkg/tool/linu-tests -o /tmp/go-build2415899998/b080/_pk-errorsas 5899998/b222/ x_amd64/vet -p crypto/internal/api -lang=go1.25 x_amd64/vet (http block)
  • https://api.github.com/repos/nonexistent/action/git/ref/tags/v999.999.999
    • Triggering command: /usr/bin/gh gh api /repos/nonexistent/action/git/ref/tags/v999.999.999 --jq .object.sha ignore-path ../../../.prettierignore -trimpath /opt/hostedtoolcache/go/1.25.0/x64/pkg/tool/linu-nilfunc -I /tmp/go-build241-c -I /opt/hostedtoolcache/go/1.25.0/xconfig -uns�� -unreachable=false /tmp/go-build2415899998/b044/vet.cfg .cfg -D GOAMD64_v1 -gensymabis ache/go/1.25.0/x--write (http block)

If you need me to access, download, or install something from one of these locations, you can either:

Copilot AI changed the title Fix SC1003: use double quotes for awf --allow-domains/--block-domains arguments Fix SC1003: use double quotes for awf --allow-domains/--block-domains arguments; fix playwright --no-sandbox arg Feb 23, 2026
@pelikhan pelikhan added the smoke label Feb 23, 2026
@github-actions
Copy link
Contributor

📰 BREAKING: Smoke Copilot is now investigating this pull request. Sources say the story is developing...

@github-actions
Copy link
Contributor

github-actions bot commented Feb 23, 2026

✨ The prophecy is fulfilled... Smoke Codex has completed its mystical journey. The stars align. 🌟

@github-actions
Copy link
Contributor

github-actions bot commented Feb 23, 2026

🎬 THE ENDSmoke Claude MISSION: ACCOMPLISHED! The hero saves the day! ✨

@github-actions
Copy link
Contributor

Commit pushed: d161e78

@github-actions
Copy link
Contributor

🤖 Smoke test §22304444079 results for @pelikhan:

Test Status
GitHub MCP
Safe Inputs GH CLI
Serena MCP ⚠️ (not available)
Playwright
Web Fetch
File Writing + Bash
Discussion Interaction
Build gh-aw
Discussion Creation
Workflow Dispatch
PR Review

Overall: ✅ PASS

📰 BREAKING: Report filed by Smoke Copilot

@github-actions github-actions bot removed the smoke label Feb 23, 2026
Copy link
Contributor

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This PR correctly fixes SC1003 shellcheck warnings by wrapping --allow-domains and --block-domains argument values in double quotes across all affected workflow lock files. The change is minimal and targeted. No issues found.

📰 BREAKING: Report filed by Smoke Copilot

---
"gh-aw": patch
---
Double-quote `awf --allow-domains`/`--block-domains` arguments so SC1003 warnings disappear while keeping wildcard lists intact.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good changeset description — clearly explains the SC1003 fix. The double-quoting of domain lists is the right approach for shell compatibility.

@github-actions
Copy link
Contributor

📰 VERDICT: Smoke Copilot has concluded. All systems operational. This is a developing story. 🎤

@pelikhan pelikhan merged commit bf34f99 into main Feb 23, 2026
1 check passed
@pelikhan pelikhan deleted the copilot/fix-allow-domains-quotes branch February 23, 2026 11:42
@github-actions
Copy link
Contributor

PR titles: [docs] Update glossary - weekly full scan; [specs] Update layout specification - 2026-02-23
GitHub MCP: ✅
Serena activate: ✅
Serena find_symbol: ✅
Playwright title: ✅
Web-fetch: ✅
File write+cat: ✅
Build: ✅
Overall: PASS

🔮 The oracle has spoken through Smoke Codex

Copy link
Contributor

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💥 Automated smoke test review - all systems nominal!

💥 [THE END] — Illustrated by Smoke Claude

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[plan] Fix SC1003: Switch awf --allow-domains from single to double quotes in 23 workflow source files

2 participants