u/navierstokes88

I built a deterministic PR reviewability gate for GitHub

Hey r/coolgithubprojects,

I built ReviewGate, an open-source GitHub Action for checking whether a pull request is actually reviewable before human reviewers spend time on it.

The idea is simple: AI coding tools made it much easier to generate large PRs, but human review capacity did not scale with that. So instead of trying to review code correctness, ReviewGate focuses only on PR shape.

It checks things like:

  • PR size
  • missing or weak descriptions
  • too many files changed
  • risky paths touched without enough context
  • missing linked issues
  • whether the PR looks like it should be split

It does not try to be an AI code reviewer, security scanner, or bug detector. The goal is narrower: help teams reject or fix bad PRs before senior engineers burn time opening them.

Some technical details:

  • deterministic Python core
  • no LLM calls
  • no network or filesystem access in the core engine
  • configurable with .reviewgate.yml
  • GitHub Action support
  • PR comments, labels, and status checks
  • Apache 2.0 licensed

Repo: https://github.com/leo-aa88/reviewgate

I’d love feedback from people who deal with large PRs or high PR velocity.

What rules would you add for deciding whether a PR is “reviewable” before assigning human reviewers?

u/navierstokes88 — 9 days ago

Agentic Control Plane is a lightweight control layer for managing AI agents like infrastructure.

What it does

  • Declarative YAML for:
    • agents
    • workflows
    • tools
    • policies
  • agentctl plan → preview changes before applying
  • agentctl apply → safe deployment
  • Policy gates:
    • budgets
    • approvals
    • tool restrictions
  • Works with:
    • native tools
    • HTTP
    • MCP
  • Structured logs + traces

Extras

  • Example: declarative GitHub PR reviewer (can run fully simulated)
  • Local-first (SQLite)
  • MIT licensed
  • Prebuilt binaries

Repo: https://github.com/LAA-Software-Engineering/agentic-control-plane

If you’re building agent workflows and want something more reproducible and auditable, this might be useful.

Feedback welcome 👍

u/navierstokes88 — 17 days ago

Anyone running multi-agent workflows long enough has seen this:

It works great for ~48 hours… then:

  • unknown tool calls
  • API costs spike overnight
  • no clear view of what’s actually running

I built Agentic Control Plane to solve that.

A declarative control layer for agent systems, inspired by Terraform.

Core idea

Define everything explicitly:

  • agents
  • workflows
  • tools
  • policies

…in YAML, and manage it with:

agentctl plan → review changes
agentctl apply → deploy safely

Features

  • Diff-based planning (plan) with visibility into changes
  • Safe apply with optimistic concurrency
  • Policy enforcement at runtime:
    • budgets
    • approvals
    • tool allow-lists
    • rate limits
  • Local-first state (SQLite)
  • Structured logs + execution traces
  • Tool support: native / HTTP / MCP

Positioning

Not another framework.

This sits on top of existing agent setups as an ops/control layer.

Quickstart

agentctl init my-agent-swarm
agentctl plan
agentctl apply
agentctl run workflow/pr-reviewer

There’s a simulated GitHub PR reviewer example (no API keys) showing policy enforcement in practice.

Repo: https://github.com/LAA-Software-Engineering/agentic-control-plane
MIT • binaries • examples • design doc

Curious about:

  • policy patterns you’ve found useful
  • how you’re managing drift / reproducibility today
reddit.com
u/navierstokes88 — 17 days ago

Most agent frameworks bury all the prompts, tool wiring, policies, and permissions deep in code. Good luck reviewing changes, auditing what actually ran, or enforcing budgets/approvals at runtime.I built Agentic Control Plane to fix that. It's a declarative control plane (inspired by Terraform + Kubernetes + GitOps) for your agent systems:

  • Versioned YAML for Projects, Agents, Workflows, Tools, and Policies
  • agentctl validate → plan → apply loop (with diffs, risk hints, and optimistic concurrency)
  • Local-first SQLite state (deployment + structured execution traces)
  • Native, HTTP, Mock, and MCP tools (stdio or streamable HTTP)
  • Policy gates on execution (budgets, approvals, tool rules)
  • Full agentctl logs with traces
  • Works great in CI (GitHub Actions example included)

It's not yet another agent framework — it's the operating layer on top so you can treat your agent setup like real infrastructure.Quick start

bash

agentctl init my-agent-system
agentctl validate --project my-agent-system
agentctl plan --project my-agent-system
agentctl apply --project my-agent-system --auto-approve
agentctl run workflow/hello --project my-agent-system
agentctl logs --project my-agent-system --workflow hello

Featured demo: Declarative PR reviewer (with policy blocking) — runs with no API keys in the simulated version, or live with gpt-4o-mini in GitHub Actions.Repo: https://github.com/LAA-Software-Engineering/agentic-control-planePrebuilt binaries, full design doc, examples, and MIT license included.Would love feedback from the community — especially on the YAML spec, policy model, or ideas for next features (parallel steps, remote reconciliation, etc.).What do you think — is this the kind of "control plane" layer agentic workflows need to move from experiments to production?

Most agent frameworks bury prompts, tool wiring, and permissions deep in code.

That makes it hard to:

  • review changes
  • audit what actually ran
  • enforce budgets / approvals at runtime

So I built something different: a declarative control plane for agent systems.

Think Terraform + Kubernetes + GitOps, but for agents.

What it does

  • Versioned YAML for:
    • Projects
    • Agents
    • Workflows
    • Tools
    • Policies
  • agentctl validate → plan → apply
    • diffs
    • risk hints
    • optimistic concurrency
  • Local-first state (SQLite)
    • deployments
    • structured execution traces
  • Tooling:
    • Native
    • HTTP
    • Mock
    • MCP (stdio / streamable HTTP)
  • Policy gates at execution time:
    • budgets
    • approvals
    • tool restrictions
  • Full logs + traces via CLI
  • CI-friendly (GitHub Actions example included)

Why

This is not another agent framework.

It’s the operating layer on top, so you can treat agent systems like real infrastructure:

  • declarative
  • reviewable
  • reproducible
  • enforceable

Quick start

agentctl init my-agent-system
agentctl validate --project my-agent-system
agentctl plan --project my-agent-system
agentctl apply --project my-agent-system --auto-approve

agentctl run workflow/hello --project my-agent-system
agentctl logs --project my-agent-system --workflow hello

Demo

  • Declarative PR reviewer with policy blocking
  • Runs:
    • fully simulated (no API keys)
    • or live with gpt-4o-mini in GitHub Actions

Repo

https://github.com/LAA-Software-Engineering/agentic-control-plane

  • prebuilt binaries
  • examples
  • design doc
  • MIT

Would love feedback, especially on:

  • YAML spec design
  • policy model
  • next features (parallel steps, remote reconciliation, etc.)

Question:
Does this “control plane” layer make sense to you for moving agent workflows from experiments → production?

reddit.com
u/navierstokes88 — 22 days ago