Problem
The gh-aw compiler generates an activation guard that explicitly blocks bot senders, which prevents Dependabot PRs from running agentic workflows like smoke tests.
In smoke-claude.lock.yml:54:
if: (github.event_name != 'pull_request' || (github.event.pull_request.head.repo.id == github.repository_id && github.event.sender.type != 'Bot'))
Dependabot's sender.type is 'Bot', so the activation job is skipped entirely — even if the secrets issue (see companion issue) is resolved.
Note: build-test.lock.yml does NOT have the sender.type != 'Bot' check, only the repo ID check, so it would work for Dependabot once secrets are available.
Context
This condition is generated by the gh-aw compiler, not manually authored. The sender.type != 'Bot' guard is a security measure to prevent untrusted bot actors from triggering agentic workflows. However, Dependabot is a trusted first-party GitHub bot operating on same-repo PRs.
Proposed Fix
This is an upstream issue in the gh-aw compiler. Possible approaches:
- Allow trusted bots: Change the condition to allowlist specific trusted bots (e.g.,
dependabot[bot]) rather than blocking all bots
- Remove bot check for same-repo PRs: The repo ID check (
head.repo.id == repository_id) already guards against fork PRs. For same-repo PRs, the bot check may be unnecessary
- Make it configurable: Add a frontmatter option to control whether bot senders are allowed
Related
Problem
The gh-aw compiler generates an activation guard that explicitly blocks bot senders, which prevents Dependabot PRs from running agentic workflows like smoke tests.
In
smoke-claude.lock.yml:54:Dependabot's
sender.typeis'Bot', so the activation job is skipped entirely — even if the secrets issue (see companion issue) is resolved.Note:
build-test.lock.ymldoes NOT have thesender.type != 'Bot'check, only the repo ID check, so it would work for Dependabot once secrets are available.Context
This condition is generated by the gh-aw compiler, not manually authored. The
sender.type != 'Bot'guard is a security measure to prevent untrusted bot actors from triggering agentic workflows. However, Dependabot is a trusted first-party GitHub bot operating on same-repo PRs.Proposed Fix
This is an upstream issue in the gh-aw compiler. Possible approaches:
dependabot[bot]) rather than blocking all botshead.repo.id == repository_id) already guards against fork PRs. For same-repo PRs, the bot check may be unnecessaryRelated