Skip to main content

Local no-token scanner for GitHub repository hygiene and CI risk signals.

Project description

Repository Hygiene / CI Risk Preflight

Local no-token scanner for GitHub repository hygiene, CI policy, and release-readiness signals before they become public repo or package release blockers.

Use this before opening a public repo, adding CI gates, publishing a package, or preparing a release checklist. It is broader than the GitHub Actions deprecation scanner: this tool checks repo/package/release hygiene, not only action-version migration risks.

This is the bridge product in the Engineering Risk Preflight suite: it starts as a CLI, can be used in GitHub Actions, and can later inform a GitHub App/SaaS only after demand is validated.

What it checks

The scanner reads only files in a checked-out repository. It does not use the GitHub API, tokens, network calls, SaaS accounts, private repo integrations, or source uploads.

Current rule categories:

  • ci-deprecation: stale GitHub Actions majors such as upload-artifact@v3, download-artifact@v3, cache@v3, checkout@v3, setup-node@v3.
  • ci-runtime: local JavaScript actions using old Node runtimes.
  • ci-permissions: broad workflow permissions such as write-all, contents: write, and pull_request_target review prompts.
  • repo-hygiene: missing CODEOWNERS, SECURITY.md, CONTRIBUTING.md, and changelog/release history.
  • dependency-hygiene: missing Dependabot/Renovate config.
  • ci-observability: missing test report artifacts/summaries and artifact upload steps without if: always().
  • release-safety: release/publish workflows without visible guardrails.
  • ci-cost: jobs without visible timeout-minutes.

Repository readiness story

Top checks to run before a repo or package is promoted publicly:

  1. Is there a visible license/security/contribution posture?
  2. Are CI workflows using risky broad permissions or pull_request_target patterns?
  3. Are release/publish jobs guarded by tags, manual dispatch, environments, or explicit conditions?
  4. Are test reports and failure artifacts preserved for debugging?
  5. Are dependency update tools configured?
  6. Are stale action majors or local Node runtimes likely to break CI later?

Sample report excerpt:

- high `workflow-write-all-permissions`
  - Why: Broad workflow permissions increase blast radius if a workflow is abused.
  - Fix: Prefer least-privilege `permissions:` at workflow/job scope.

- medium `missing-security-policy`
  - Why: Public repos should tell users how to report vulnerabilities.
  - Fix: Add SECURITY.md with supported versions and a private reporting path.

Install from PyPI

python3 -m pip install repo-hygiene-ci-risk-preflight
repo-hygiene-preflight path/to/repo --format markdown
repo-hygiene-preflight path/to/repo --format json
repo-hygiene-preflight path/to/repo --format annotations
repo-hygiene-preflight path/to/repo --fail-on-severity high
repo-hygiene-preflight --list-rules

PyPI: https://pypi.org/project/repo-hygiene-ci-risk-preflight/

Try from a clone

python3 scanner.py examples
python3 scanner.py examples --format json
python3 scanner.py examples --format annotations
python3 scanner.py examples --min-severity medium
python3 scanner.py examples --fail-on-severity high
python3 scanner.py --list-rules

Generated example reports:

GitHub Action wrapper (planned)

A Marketplace-friendly GitHub Action wrapper is being prepared. The intended usage is:

name: repo-hygiene-preflight
on:
  pull_request:
  workflow_dispatch:
permissions:
  contents: read
jobs:
  hygiene:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4
      - uses: vasiliy0/repo-hygiene-ci-risk-preflight@v0.1.1
        with:
          format: markdown
          output: repo-hygiene-report.md

Until the Action is released, use the PyPI install flow above in CI.

Config and baselines

Auto-load .repo-hygiene-preflight.json or pass --config:

{
  "ignore_rules": ["workflow-without-timeout"],
  "only_rules": [],
  "ignore_paths": ["docs/generated/**"],
  "severity_overrides": {"missing-contributing": "info"},
  "baseline_fingerprints": []
}

Baseline existing findings for gradual rollout:

python3 scanner.py . --format json --output report.json --write-baseline repo-hygiene-baseline.json
python3 scanner.py . --baseline repo-hygiene-baseline.json --fail-on-severity high

Outputs

  • Markdown report for local review or $GITHUB_STEP_SUMMARY.
  • JSON report for CI artifacts or later policy processing.
  • GitHub workflow annotation commands via --format annotations.
  • Stable finding fingerprints for suppressions and baselines.

For AI agents and automation

Use JSON mode as the stable machine interface:

repo-hygiene-preflight . --format json --output repo-hygiene-report.json --quiet --no-color

Machine contract: schemas/report.schema.json (schema_version: 1.0). Findings include rule id, severity, category, file/line, matched signal, fix guidance, and stable fingerprints for baselines/reruns. GitHub annotation output is available with --format annotations.

Exit codes: 0 completed/report-only, 1 configured severity gate matched, 2 usage/config/input error, 3 reserved for runtime/tool errors.

Agent workflow docs: docs/AGENT_INTEGRATION.md.

Docs

  • docs/RULE_INVENTORY.md — current rule inventory.
  • docs/CONFIGURATION.md — config and baseline behavior.
  • docs/CI_USAGE.md — GitHub Actions usage patterns.
  • docs/GITHUB_ACTION_DRAFT.md — local design artifact for a future wrapper action.
  • docs/PYPI_TESTPYPI_READINESS.md — package readiness checklist.

Privacy posture

  • Local files only.
  • No GitHub token required.
  • No source upload.
  • Findings include file paths and matching lines; review before sharing publicly.
  • Rules are conservative preflight signals, not compliance/security guarantees.

Related Engineering Risk Preflight tools

Monetization hypothesis

Free CLI/GitHub Action first. Paid add-ons later only after demand validation: team policy packs, release-readiness rule bundles, scheduled org reports, or an org dashboard.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

repo_hygiene_ci_risk_preflight-0.1.1.tar.gz (15.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

repo_hygiene_ci_risk_preflight-0.1.1-py3-none-any.whl (12.8 kB view details)

Uploaded Python 3

File details

Details for the file repo_hygiene_ci_risk_preflight-0.1.1.tar.gz.

File metadata

File hashes

Hashes for repo_hygiene_ci_risk_preflight-0.1.1.tar.gz
Algorithm Hash digest
SHA256 e0f8bdaa46cd297190d41113586d827aee38043f4ca6270155241883c2c7f554
MD5 b9eea4aa5b20ff6c2791865a6464268a
BLAKE2b-256 f3ecb7b9cdedc2e3947ec631827d7e8e6646235791686f1726524eb9961707cc

See more details on using hashes here.

Provenance

The following attestation bundles were made for repo_hygiene_ci_risk_preflight-0.1.1.tar.gz:

Publisher: publish.yml on vasiliy0/repo-hygiene-ci-risk-preflight

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file repo_hygiene_ci_risk_preflight-0.1.1-py3-none-any.whl.

File metadata

File hashes

Hashes for repo_hygiene_ci_risk_preflight-0.1.1-py3-none-any.whl
Algorithm Hash digest
SHA256 3e980916c30dd6bda4a8e85261d37657fd6850595cd040a06157795cd1b93af8
MD5 09724c0911ea69cdb173fe4a028983f5
BLAKE2b-256 8a910e0d4f7f8bb24fbb3dab72c98c3ee40542efb40a098800f361e0a723edfb

See more details on using hashes here.

Provenance

The following attestation bundles were made for repo_hygiene_ci_risk_preflight-0.1.1-py3-none-any.whl:

Publisher: publish.yml on vasiliy0/repo-hygiene-ci-risk-preflight

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page