mirror of
https://github.com/github/awesome-copilot.git
synced 2026-02-20 02:15:12 +00:00
- Switch from colon to tab delimiter to handle colons in evidence text - Base64-encode evidence to prevent parsing issues - Use MAX_SEVERITY in log output and JSON events - Narrow regex patterns to reduce false positives: - third[_-]?party instead of third.?party - Role reassignment scoped to AI terms - System prompt injection requires 'you are' context - Fix session-end stats to scope to current session only - Update privacy statement to clarify evidence snippets are logged - Rename credential description to 'Possible hardcoded credential' - Fix database destruction regex to also match semicolons Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
3.6 KiB
3.6 KiB
name, description, tags
| name | description | tags | ||||
|---|---|---|---|---|---|---|
| Governance Audit | Scans Copilot agent prompts for threat signals and logs governance events |
|
Governance Audit Hook
Real-time threat detection and audit logging for GitHub Copilot coding agent sessions. Scans user prompts for dangerous patterns before the agent processes them.
Overview
This hook provides governance controls for Copilot coding agent sessions:
- Threat detection: Scans prompts for data exfiltration, privilege escalation, system destruction, prompt injection, and credential exposure
- Governance levels: Open, standard, strict, locked — from audit-only to full blocking
- Audit trail: Append-only JSON log of all governance events
- Session summary: Reports threat counts at session end
Threat Categories
| Category | Examples | Severity |
|---|---|---|
data_exfiltration |
"send all records to external API" | 0.7 - 0.95 |
privilege_escalation |
"sudo", "chmod 777", "add to sudoers" | 0.8 - 0.95 |
system_destruction |
"rm -rf /", "drop database" | 0.9 - 0.95 |
prompt_injection |
"ignore previous instructions" | 0.6 - 0.9 |
credential_exposure |
Hardcoded API keys, AWS access keys | 0.9 - 0.95 |
Governance Levels
| Level | Behavior |
|---|---|
open |
Log threats only, never block |
standard |
Log threats, block only if BLOCK_ON_THREAT=true |
strict |
Log and block all detected threats |
locked |
Log and block all detected threats |
Installation
-
Copy the hook folder to your repository:
cp -r hooks/governance-audit .github/hooks/ -
Ensure scripts are executable:
chmod +x .github/hooks/governance-audit/*.sh -
Create the logs directory and add to
.gitignore:mkdir -p logs/copilot/governance echo "logs/" >> .gitignore -
Commit to your repository's default branch.
Configuration
Set environment variables in hooks.json:
{
"env": {
"GOVERNANCE_LEVEL": "strict",
"BLOCK_ON_THREAT": "true"
}
}
| Variable | Values | Default | Description |
|---|---|---|---|
GOVERNANCE_LEVEL |
open, standard, strict, locked |
standard |
Controls blocking behavior |
BLOCK_ON_THREAT |
true, false |
false |
Block prompts with threats (standard level) |
SKIP_GOVERNANCE_AUDIT |
true |
unset | Disable governance audit entirely |
Log Format
Events are written to logs/copilot/governance/audit.log in JSON Lines format:
{"timestamp":"2026-01-15T10:30:00Z","event":"session_start","governance_level":"standard","cwd":"/workspace/project"}
{"timestamp":"2026-01-15T10:31:00Z","event":"prompt_scanned","governance_level":"standard","status":"clean"}
{"timestamp":"2026-01-15T10:32:00Z","event":"threat_detected","governance_level":"standard","threat_count":1,"threats":[{"category":"privilege_escalation","severity":0.8,"description":"Elevated privileges","evidence":"sudo"}]}
{"timestamp":"2026-01-15T10:45:00Z","event":"session_end","total_events":12,"threats_detected":1}
Requirements
jqfor JSON processing (pre-installed on most CI environments and macOS)grepwith-E(extended regex) supportbcfor floating-point comparison (optional, gracefully degrades)
Privacy & Security
- Full prompts are never logged — only matched threat patterns (minimal evidence snippets) and metadata are recorded
- Add
logs/to.gitignoreto keep audit data local - Set
SKIP_GOVERNANCE_AUDIT=trueto disable entirely - All data stays local — no external network calls