How to detect headless agent risk
How to detect headless agent risk
Wrkr evaluates your AI dev tool configurations across your GitHub repo/org against policy. Posture-scored, compliance-ready.
When to use
Use this when you need ranked findings for autonomous CI/headless agent usage and high-blast-radius execution paths.
Exact commands
wrkr scan --path ./scenarios/wrkr/scan-mixed-org/repos --profile standard --json
wrkr report --top 5 --json
wrkr score --jsonExpected JSON keys
scan:ranked_findings,top_findings,attack_paths,top_attack_paths,repo_exposure_summaries,profile,posture_scorereport:status,top_findings,attack_paths,top_attack_paths,total_tools,compliance_gap_count,summaryscore:score,grade,breakdown,weighted_breakdown,weights,trend_delta(optional:attack_paths,top_attack_paths)
Exit codes
0: success3: policy/schema violation5: regression drift (when validating against a baseline in regress flow)
Sample output snippet
{
"status": "ok",
"top_findings": [
{"id": "WRKR-014", "risk_score": 9.1, "title": "headless_auto CI agent with elevated permissions"}
],
"top_attack_paths": [
{"path_id": "acme/repo:entry-webmcp->ci-headless->prod-write", "path_score": 9.4}
],
"total_tools": 12
}Deterministic guarantees
- Ranked findings use deterministic tie-breakers.
- Output schema and exit codes are stable contracts.
- Risk outputs are explainable from static repository evidence.
When not to use
- Do not use this flow as a runtime enforcement control plane.
- Do not infer live exploitability from scan-only posture data.