Tools
Tools are defined in the frontmatter to specify which GitHub API calls, browser automation, and AI capabilities are available to your workflow:
tools: edit: bash: trueSome tools are available by default. All tools declared in imported components are merged into the final workflow.
Edit Tool (edit:)
Section titled “Edit Tool (edit:)”Allows file editing in the GitHub Actions workspace.
tools: edit:Bash Tool (bash:)
Section titled “Bash Tool (bash:)”Enables shell command execution in the workspace. Defaults to safe commands (echo, ls, pwd, cat, head, tail, grep, wc, sort, uniq, date).
tools: bash: # Default safe commands bash: [] # Disable all commands bash: ["echo", "ls", "git status"] # Specific commands only bash: [":*"] # All commands (use with caution)Use wildcards like git:* for command families or :* for unrestricted access.
Web Tools
Section titled “Web Tools”Enable web content fetching and search capabilities:
tools: web-fetch: # Fetch web content web-search: # Search the web (engine-dependent)Note: Some engines require third-party Model Context Protocol (MCP) servers for web search. See Using Web Search.
GitHub Tools (github:)
Section titled “GitHub Tools (github:)”Configure GitHub API operations.
tools: github: # Default read-only access github: toolsets: [repos, issues, pull_requests] # Recommended: toolset groups mode: remote # "local" (Docker) or "remote" (hosted) read-only: true # Read-only operations github-token: "${{ secrets.CUSTOM_PAT }}" # Custom tokenGitHub Toolsets
Section titled “GitHub Toolsets”Enable specific API groups to improve tool selection and reduce context size:
tools: github: toolsets: [repos, issues, pull_requests, actions]Available: context, repos, issues, pull_requests, users, actions, code_security, discussions, labels, notifications, orgs, projects, gists, search, dependabot, experiments, secret_protection, security_advisories, stargazers
Default: context, repos, issues, pull_requests, users
Key toolsets: context (user/team info), repos (repository operations, code search, commits, releases), issues (issue management, comments, reactions), pull_requests (PR operations), actions (workflows, runs, artifacts), code_security (scanning alerts), discussions, labels.
Remote vs Local Mode
Section titled “Remote vs Local Mode”Remote Mode: Use hosted MCP server for faster startup (no Docker). Requires GH_AW_GITHUB_TOKEN:
tools: github: mode: remote # Default: "local" (Docker)Local Mode: Use Docker container for isolation. Requires docker tool and appropriate permissions:
tools: docker: github: mode: localLockdown Mode for Public Repositories
Section titled “Lockdown Mode for Public Repositories”Lockdown Mode is a security feature that filters public repository content to only show issues, PRs, and comments from users with push access. Automatically enabled for public repositories when using custom tokens. See Lockdown Mode for complete documentation.
tools: github: lockdown: true # Force enable (automatic for public repos) lockdown: false # Disable (for workflows processing all user input)GitHub App Authentication
Section titled “GitHub App Authentication”Use GitHub App tokens for enhanced security with short-lived, automatically-revoked credentials. GitHub Apps provide on-demand token minting at workflow start, automatic revocation at workflow end (even on failure), and permissions automatically mapped from your job’s permissions field.
See Using a GitHub App for Authentication for complete setup, configuration details, and security benefits.
Token precedence: GitHub App → github-token → GH_AW_GITHUB_MCP_SERVER_TOKEN → GH_AW_GITHUB_TOKEN → GITHUB_TOKEN
Playwright Tool (playwright:)
Section titled “Playwright Tool (playwright:)”Configure Playwright for browser automation and testing:
tools: playwright: version: "1.56.1" # Optional: defaults to 1.56.1, use "latest" for newestDomain Access: Controlled by the top-level network: field. Uses ecosystem bundles (defaults, github, node, python, etc.). Defaults to ["localhost", "127.0.0.1"]. Domains auto-include subdomains.
GitHub Actions Compatibility: Playwright runs in a Docker container with security flags required for Chromium to function on GitHub Actions runners (--security-opt seccomp=unconfined and --ipc=host). These flags are automatically configured by gh-aw version 0.41.0 and later.
Built-in MCP Tools
Section titled “Built-in MCP Tools”Agentic Workflows (agentic-workflows:)
Section titled “Agentic Workflows (agentic-workflows:)”Provides workflow introspection, log analysis, and debugging tools. Requires actions: read permission:
permissions: actions: readtools: agentic-workflows:See MCP Server for available operations.
Cache Memory (cache-memory:)
Section titled “Cache Memory (cache-memory:)”Persistent memory storage across workflow runs for trends and historical data.
tools: cache-memory:Repo Memory (repo-memory:)
Section titled “Repo Memory (repo-memory:)”Repository-specific memory storage for maintaining context across executions.
tools: repo-memory:Custom MCP Servers (mcp-servers:)
Section titled “Custom MCP Servers (mcp-servers:)”Integrate custom Model Context Protocol servers for third-party services:
mcp-servers: slack: command: "npx" args: ["-y", "@slack/mcp-server"] env: SLACK_BOT_TOKEN: "${{ secrets.SLACK_BOT_TOKEN }}" allowed: ["send_message", "get_channel_history"]Options: command + args (process-based), container (Docker image), url + headers (HTTP endpoint), registry (MCP registry URI), env (environment variables), allowed (tool restrictions). See MCPs Guide for setup.
Registry Field
Section titled “Registry Field”The registry field specifies the URI to an MCP server’s installation location in an MCP registry. This is useful for documenting the source of an MCP server and can be used by tooling to discover and install MCP servers:
mcp-servers: markitdown: registry: "https://api.mcp.github.com/v0/servers/microsoft/markitdown" command: "npx" args: ["-y", "@microsoft/markitdown"]When to use:
- Document server source: Include
registryto indicate where the MCP server is published - Registry-aware tooling: Some tools may use the registry URI for discovery and version management
- Both stdio and HTTP servers: Works with both
command-based stdio servers andurl-based HTTP servers
Examples:
# Stdio server with registrymcp-servers: filesystem: registry: "https://api.mcp.github.com/v0/servers/modelcontextprotocol/filesystem" command: "npx" args: ["-y", "@modelcontextprotocol/server-filesystem"]
# HTTP server with registrymcp-servers: custom-api: registry: "https://registry.example.com/servers/custom-api" url: "https://api.example.com/mcp" headers: Authorization: "Bearer ${{ secrets.API_TOKEN }}"The registry field is informational and does not affect server execution. It complements other configuration fields like command, args, container, or url.
Related Documentation
Section titled “Related Documentation”- Safe Inputs - Define custom inline tools with JavaScript or shell scripts
- Frontmatter - All frontmatter configuration options
- Network Permissions - Network access control for AI engines
- MCPs - Complete Model Context Protocol setup and usage
- CLI Commands - CLI commands for workflow management
- Workflow Structure - Directory layout and organization
- Imports - Modularizing workflows with includes