Current approval paths
- Hosted API approval
- GitHub comment approval capture
What is true today
- risky plans can require approval before apply
- agents cannot self-approve without approval permission
- approval changes the plan’s next action
- approval and apply show up in the audit trail
When approval usually matters
- production-facing env var changes
- shared secret rotation
- coordinated multi-provider changes
- anything with
deployAfter: trueon meaningful targets
GitHub path in one glance
- create an approval-gated plan with
requestChannel: "github-comment" - include repo + issue or PR context
- provide an approver allowlist
- Keycli posts the summary comment
- an allowed human comments
/keycli approve <plan-id> - Keycli verifies the context and approves the plan
What GitHub approval is not yet
- full GitHub App workflow automation
- broad repo-membership inference
- deep retry and reconciliation machinery
Best first learning loop
- low-risk preview change
- high-risk approval-gated change
- inspect the audit trail