Skip to content
Closed
Show file tree
Hide file tree
Changes from 5 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
16 changes: 16 additions & 0 deletions scripts/audit/run_audit.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
#!/bin/bash
Copy link

Copilot AI Jan 28, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The PR description suggests running the audit script directly in Codespaces as /scripts/audit/run_audit.sh github/cmark-gfm, but the script is added at scripts/audit/run_audit.sh within the repo, so the correct usage from the repo root would be ./scripts/audit/run_audit.sh github/cmark-gfm (or similar). Please align the description and any user-facing examples with the actual relative path so users don’t try to call a non-existent absolute /scripts/... path.

Copilot uses AI. Check for mistakes.
# SPDX-FileCopyrightText: 2025 GitHub
# SPDX-License-Identifier: MIT

set -e

if [ -z "$1" ]; then
echo "Usage: $0 <repo>";
exit 1;
fi

python -m seclab_taskflow_agent -t seclab_taskflows.taskflows.audit.fetch_source_code -g repo=$1
python -m seclab_taskflow_agent -t seclab_taskflows.taskflows.audit.identify_applications -g repo=$1
python -m seclab_taskflow_agent -t seclab_taskflows.taskflows.audit.gather_web_entry_point_info -g repo=$1
python -m seclab_taskflow_agent -t seclab_taskflows.taskflows.audit.classify_application_local -g repo=$1
python -m seclab_taskflow_agent -t seclab_taskflows.taskflows.audit.audit_issue_local_iter -g repo=$1
Comment thread
kevinbackhouse marked this conversation as resolved.
18 changes: 18 additions & 0 deletions scripts/run_seclab_agent.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
#!/bin/bash
# SPDX-FileCopyrightText: 2025 GitHub
Comment thread
kevinbackhouse marked this conversation as resolved.
# SPDX-License-Identifier: MIT

Copy link

Copilot AI Jan 28, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The script has been moved from src/run_seclab_agent.sh to scripts/run_seclab_agent.sh, but the top-level README and other docs (for example README.md lines 7–9 and src/seclab_taskflows/mcp_servers/codeql_python/README.md line 29) still reference the old location and assume it is run from src. Please update those docs and examples to point at the new scripts/ path and root-level .env/data locations so users don’t follow outdated instructions.

Copilot uses AI. Check for mistakes.
if [ ! -f ".env" ]; then
touch ".env"
fi

mkdir -p logs
Comment thread
kevinbackhouse marked this conversation as resolved.

# Note: this uses the trick described [here](https://unix.stackexchange.com/a/646335)
# to pass extra command line arguments into `bash -c`.
docker run -i \
Comment thread
kevinbackhouse marked this conversation as resolved.
--mount type=bind,src="$PWD",dst=/app \
--mount type=bind,src="./logs",dst=/root/.local \
-e GH_TOKEN="$GH_TOKEN" -e AI_API_TOKEN="$AI_API_TOKEN" --entrypoint /bin/bash \
"ghcr.io/githubsecuritylab/seclab-taskflow-agent" \
-c 'pip install -q -e /app && exec "$@"' this-is-bash-dollar-zero "$@"
16 changes: 0 additions & 16 deletions src/run_audit.sh

This file was deleted.

13 changes: 0 additions & 13 deletions src/run_seclab_agent.sh

This file was deleted.