github-actions-failure-hour-audit

Audit GitHub Actions failure timing by day/hour to surface recurring outage windows and staffing hotspots.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "github-actions-failure-hour-audit" with this command: npx skills add daniellummis/github-actions-failure-hour-audit

GitHub Actions Failure Hour Audit

Use this skill to identify when failures cluster so teams can target flaky time windows and on-call coverage.

What this skill does

  • Reads one or more GitHub Actions workflow run JSON exports
  • Keeps only failure-like conclusions (failure, cancelled, timed_out, action_required, startup_failure)
  • Buckets failures into day/hour windows (with optional timezone offset)
  • Ranks windows by severity using failure-run thresholds
  • Emits text or JSON output for dashboards or CI gates

Inputs

Optional:

  • RUN_GLOB (default: artifacts/github-actions/*.json)
  • TOP_N (default: 24)
  • OUTPUT_FORMAT (text or json, default: text)
  • WARN_FAILURE_RUNS (default: 3)
  • CRITICAL_FAILURE_RUNS (default: 6)
  • FAIL_ON_CRITICAL (0 or 1, default: 0)
  • TZ_OFFSET_HOURS (default: 0) — integer timezone shift from UTC, between -23 and 23
  • WORKFLOW_MATCH, WORKFLOW_EXCLUDE (regex, optional)
  • BRANCH_MATCH, BRANCH_EXCLUDE (regex, optional)
  • REPO_MATCH, REPO_EXCLUDE (regex, optional)

Collect run JSON

gh run view <run-id> --json databaseId,workflowName,headBranch,conclusion,createdAt,updatedAt,url,repository \
  > artifacts/github-actions/run-<run-id>.json

Run

Text report:

RUN_GLOB='artifacts/github-actions/*.json' \
WARN_FAILURE_RUNS=3 \
CRITICAL_FAILURE_RUNS=6 \
TZ_OFFSET_HOURS=7 \
bash skills/github-actions-failure-hour-audit/scripts/failure-hour-audit.sh

JSON output + fail gate:

RUN_GLOB='artifacts/github-actions/*.json' \
OUTPUT_FORMAT=json \
FAIL_ON_CRITICAL=1 \
bash skills/github-actions-failure-hour-audit/scripts/failure-hour-audit.sh

Output contract

  • Exit 0 in reporting mode
  • Exit 1 when FAIL_ON_CRITICAL=1 and one or more critical windows are found
  • Text output includes summary and top windows by severity
  • JSON output includes summary, ranked windows, and critical_windows

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

Code Review Inspector

Automated code review checking for bugs, security issues, best practices, performance problems, and code style

Registry SourceRecently Updated
Security

agent-bom runtime

AI runtime security monitoring — context graph analysis, runtime audit log correlation with CVE findings, and vulnerability analytics queries. Use when the u...

Registry SourceRecently Updated
Security

agent-bom scan

Open security scanner for agentic infrastructure — agents, MCP, packages, blast radius, runtime, and trust for package CVEs (OSV, NVD, EPSS, KEV), container...

Registry SourceRecently Updated
Security

agent-bom vulnerability intel

Use agent-bom to check package, SBOM, inventory, and agent dependency exposure against OSV, GitHub Security Advisories, NVD, EPSS, and CISA KEV with explicit...

Registry SourceRecently Updated