Skip to content

[Bug] [github team] Organization member failed to use Organization installed GitHub App in Copilot #11

Open
@leungkimming2

Description

Describe the bug
An organization member, with a Copilot Business seat assigned by the organization owner, when typing "@" in VS Code Copilot chat could not see the GitHub Apps installed by the organization owner onto the organization.

To Reproduce
Steps to reproduce the behavior:

  1. setup ORG1 organization and purchase GitHub Copilot Business subscription.
  2. enabled the Copilot Extensions policy for the organization.
  3. assigned a Copilot Business seat to a member Member1
  4. the owner ORG1 installed "Mermaid Chart" GitHub App onto Org1
  5. Member1 logon GitHub Copilot in VS Code and type "@", "Mermaid Chart" did not appear.
  6. According to this GitHub Document, Member1 should be able to use Mermaid Chart.

Expected behavior
When Member1 logon GitHub Copilot in VS Code and type "@", "Mermaid Chart" should appear

Screenshots
NA

Desktop (please complete the following information):

  • OS: Windows 11
  • VS Code: 1.95.3

Smartphone (please complete the following information):
NA

Additional context
Here is a workaround:
After the Organization owner installed Mermaid Chart to the Organization, the member should first login GitHub.com and invoke Copilot Chat on the browser. Typing "@" won't list out installed Apps but you have to type "@Mermaid-Chart". Then, you can authorize the App. After authorizing the App, the member can navigate to personal account's Settings, Integrations, Applications. The "Installed GitHub Apps" is still empty but Mermaid-Chart was shown in the "Authorized GitHub Apps" tab. Then, the member can use VS Code, Copilot Chat and type "@" to list out Mermaid-Chart.

  1. Organization GitHub Apps should be shown in VS Code Copilot Chat after typing "@"
  2. Members should be able to view Organization's Installed Github Apps.
  3. Organization owner should be able to disable members from installing GitHub Apps thru their personal accounts if Copilot Business seat was given by the Organization. This is a serious security loophole, which will expose private repositories to unknown Copilot agents hosted elsewhere.

Metadata

Assignees

No one assigned

    Labels

    bugSomething isn't working

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions