Severity Levels
Findings are classified into three severity levels:high
high
Critical issues that should block merging.Examples:
- Security vulnerabilities
- Data corruption risks
- Authentication bypasses
- Memory leaks
- Logic errors causing incorrect behavior
medium
medium
Issues worth reviewing before merge.Examples:
- Code quality problems
- Potential bugs
- Performance issues
- Maintainability concerns
- Missing error handling
low
low
Minor improvements and suggestions.Examples:
- Style inconsistencies
- Documentation suggestions
- Minor optimizations
- Refactoring opportunities
Legacy compatibility: Old findings may use
critical (mapped to high) or info (mapped to low). These are automatically normalized.Confidence Levels
Confidence indicates how certain the skill is about a finding:high- Definite issue, very likely correctmedium- Probable issue, may need verificationlow- Possible issue, human review recommended
Findings without a confidence field are always included (backwards compatibility).
Threshold Configuration
failOn
Exit with code 1 when findings meet this severity threshold.Values:
Default: Not set (never fails)Effect:
"off", "high", "medium", "low"Default: Not set (never fails)Effect:
- CLI exits with code 1
- GitHub Actions check fails (if
failCheck = true) - GitHub review uses
REQUEST_CHANGES(ifrequestChanges = true)
reportOn
Only show findings at or above this severity level.Values:
Default: Shows all findings
"off", "high", "medium", "low"Default: Shows all findings
reportOn is a display filter. It doesn’t affect failOn logic—if a low-severity finding triggers failOn = "low", the build still fails even if reportOn = "high" hides it from display.minConfidence
Filter out findings below this confidence level.Values:
Default:
"off", "high", "medium", "low"Default:
"medium"Threshold Precedence
Thresholds can be set at three levels:- Trigger level (highest priority)
- Skill level
- Defaults level (lowest priority)
Common Configurations
Strict CI (fail on high severity)
Block PRs with high severity issues:Lenient CI (informational only)
Show findings but never fail builds:Progressive Strictness
Different thresholds for different skills:Different Thresholds by Trigger
Strict on PR, lenient locally:GitHub Integration
Threshold settings affect GitHub PR behavior:requestChanges
Use
REQUEST_CHANGES review event when findings exceed failOn threshold.Default: false- GitHub shows “Changes requested” status
- PR cannot be merged until changes are addressed
- Requires re-review to clear
failCheck
Fail the GitHub Actions check run when findings exceed
failOn threshold.Default: false- GitHub Actions check run shows red ❌
- Can block PR merge if required checks are enabled
Behavior Matrix
| failOn | requestChanges | failCheck | Findings | Result |
|---|---|---|---|---|
"high" | true | true | High severity | Request changes + fail check |
"high" | true | false | High severity | Request changes, check passes |
"high" | false | true | High severity | Comment review, fail check |
"high" | false | false | High severity | Comment review, check passes |
"off" | any | any | Any | Never fails |
Filtering Logic
Findings are filtered in this order:-
Severity filter (
reportOn)- Include findings ≥
reportOnthreshold reportOn = "off"excludes all findings
- Include findings ≥
-
Confidence filter (
minConfidence)- Include findings ≥
minConfidencethreshold minConfidence = "off"includes all confidence levels- Findings without confidence are always included
- Include findings ≥
-
Limit (
maxFindings)- Take first N findings after filtering
CLI Override
Command-line flags override configuration:Examples by Use Case
Security-First
Fail fast on any security issue:Code Quality Focus
Report quality issues without blocking:Progressive Enforcement
Start lenient, tighten over time:High-Confidence Only
Minimize false positives:Troubleshooting
No findings reported
No findings reported
Check these settings:
-
reportOn threshold too high:
-
minConfidence too high:
-
Use CLI flags to override:
Build failing unexpectedly
Build failing unexpectedly
Check Adjust threshold:
failOn threshold:Too many low-severity findings
Too many low-severity findings
Filter display:
Best Practices
-
Start lenient, tighten gradually
-
Different thresholds for different code
-
Use confidence to reduce noise
-
Limit findings in early adoption
Next Steps
Skill Configuration
Configure individual skills
Triggers
Control when skills run
GitHub Actions
Set up CI/CD integration
CLI Reference
Command-line options