| name | description | tags | ||||
|---|---|---|---|---|---|---|
Governance Audit |
Scans Copilot agent prompts for threat signals and logs governance events |
|
Real-time threat detection and audit logging for GitHub Copilot coding agent sessions. Scans user prompts for dangerous patterns before the agent processes them.
This hook provides governance controls for Copilot coding agent sessions:
- Threat detection: Scans prompts for data exfiltration, privilege escalation, system destruction, prompt injection, and credential exposure
- Governance levels: Open, standard, strict, locked — from audit-only to full blocking
- Audit trail: Append-only JSON log of all governance events
- Session summary: Reports threat counts at session end
| Category | Examples | Severity |
|---|---|---|
data_exfiltration |
"send all records to external API" | 0.7 - 0.95 |
privilege_escalation |
"sudo", "chmod 777", "add to sudoers" | 0.8 - 0.95 |
system_destruction |
"rm -rf /", "drop database" | 0.9 - 0.95 |
prompt_injection |
"ignore previous instructions" | 0.6 - 0.9 |
credential_exposure |
Hardcoded API keys, AWS access keys | 0.9 - 0.95 |
| Level | Behavior |
|---|---|
open |
Log threats only, never block |
standard |
Log threats, block only if BLOCK_ON_THREAT=true |
strict |
Log and block all detected threats |
locked |
Log and block all detected threats |
-
Copy the hook folder to your repository:
cp -r hooks/governance-audit .github/hooks/
-
Ensure scripts are executable:
chmod +x .github/hooks/governance-audit/*.sh -
Create the logs directory and add to
.gitignore:mkdir -p logs/copilot/governance echo "logs/" >> .gitignore
-
Commit to your repository's default branch.
Set environment variables in hooks.json:
{
"env": {
"GOVERNANCE_LEVEL": "strict",
"BLOCK_ON_THREAT": "true"
}
}| Variable | Values | Default | Description |
|---|---|---|---|
GOVERNANCE_LEVEL |
open, standard, strict, locked |
standard |
Controls blocking behavior |
BLOCK_ON_THREAT |
true, false |
false |
Block prompts with threats (standard level) |
SKIP_GOVERNANCE_AUDIT |
true |
unset | Disable governance audit entirely |
Events are written to logs/copilot/governance/audit.log in JSON Lines format:
{"timestamp":"2026-01-15T10:30:00Z","event":"session_start","governance_level":"standard","cwd":"/workspace/project"}
{"timestamp":"2026-01-15T10:31:00Z","event":"prompt_scanned","governance_level":"standard","status":"clean"}
{"timestamp":"2026-01-15T10:32:00Z","event":"threat_detected","governance_level":"standard","threat_count":1,"threats":[{"category":"privilege_escalation","severity":0.8,"description":"Elevated privileges","evidence":"sudo"}]}
{"timestamp":"2026-01-15T10:45:00Z","event":"session_end","total_events":12,"threats_detected":1}jqfor JSON processing (pre-installed on most CI environments and macOS)grepwith-E(extended regex) supportbcfor floating-point comparison (optional, gracefully degrades)
- Full prompts are never logged — only matched threat patterns (minimal evidence snippets) and metadata are recorded
- Add
logs/to.gitignoreto keep audit data local - Set
SKIP_GOVERNANCE_AUDIT=trueto disable entirely - All data stays local — no external network calls