Weekly GitHub Copilot Roundup: Agents in PRs, Models, Controls
This week's Copilot updates continued the shift from “help me write code” to “help me run the workflow,” with more agent work inside pull requests, issues, and project boards. Building on last week's focus on “agents you can operate at scale” (faster starts, configurable validations, traceable logs, and better reporting), this week's changes bring that thread into core GitHub surfaces teams already use: PR comments, issue sidebars, and Projects views. GitHub also expanded model choice (while retiring older models), and Microsoft integrations (SSMS, Azure App Service tooling, Fabric in VS Code) kept positioning Copilot as an embedded assistant where developers already work.
Copilot coding agent in pull requests, issues, and project tracking
After last week's improvements to execution quality (repo-tunable validations and commit-to-session traceability), Copilot's coding agent now fits PR workflows more naturally. You can invoke it on any existing pull request by commenting @copilot with the change you want, and it now updates the current PR by default instead of opening a stacked PR (unless you ask). That keeps common review iterations (fix failing Actions runs, address feedback, add tests) inside the same PR thread and history. It also builds on last week's “Agent-Logs-Url trailer” and clearer session logs: when more work happens in PRs, reviewers need direct links to what ran and why changes were made. Copilot can also handle a frequent review task: merge conflict resolution. You trigger it via comments (for example, “merge in main and resolve the conflicts”), and it works in an isolated cloud dev environment, validates builds, runs tests, and pushes updates back to the PR. Together, “make changes on this PR” plus “resolve conflicts on this PR” shortens the loop for teams that rebase/merge often or maintain long-running branches, especially with last week's validation tuning so “prove it passes” matches the repo's real feedback loop. GitHub also improved planning visibility so agent work is easier to track. When an agent is assigned to an issue, an agent session now appears in the issue sidebar with status (queued/working/waiting for review/completed) plus a link to logs. That signal can also show in GitHub Projects table/board views via “Show agent sessions,” letting teams scan what's in progress vs. waiting on humans. This continues last week's observability push (more actionable logs, live streaming in Raycast): as agents run longer and touch more steps, “where is it and where are the logs?” becomes part of normal workflow hygiene.
- Ask @copilot to make changes to any pull request
- Ask @copilot to resolve merge conflicts on pull requests
- Agent activity in GitHub Issues and Projects
Enterprise admin controls and adoption reporting for the coding agent
As more teams enable PR- and issue-driven agents (and now see agent status in Issues/Projects), GitHub is adding admin controls for where agents can operate. In public preview, org owners can manage coding agent repository access using new REST endpoints (apiVersion 2026-03-10), setting it to: enabled for no repos, enabled for all repos, or enabled only for an allowlist (with add/remove endpoints). This matches last week's operational direction (validation “speed vs safety” controls and longer-lived defaults): the coding agent is becoming something you roll out repo-by-repo with automatable, auditable settings. Usage reporting is also more specific, extending last week's push to close reporting gaps (org-level CLI activity and resolving “Auto” into the actual model). Copilot usage metrics now include used_copilot_coding_agent at the user level, so enterprises can separate “used Copilot in an IDE / agent mode” from “triggered the coding agent” (assigning Copilot to an issue or tagging @copilot in a PR comment). For internal dashboards and adoption analysis, this reduces ambiguity and aligns with this week's PR/issue-native invocation patterns.
- Manage Copilot coding agent repository access via the API
- Copilot usage metrics now identify active Copilot coding agent users
Model lifecycle and selection: Gemini 3.1 Pro arrives, Gemini 3 Pro exits
Copilot's model picker keeps expanding across clients, following last week's theme of model choice as an admin-governed surface (rollouts, LTS options, clearer attribution). Gemini 3.1 Pro is now in public preview as a selectable chat model across github.com, GitHub Mobile, VS Code, Visual Studio, JetBrains IDEs, Xcode, and Eclipse. For Copilot Business and Enterprise, admins must enable the Gemini 3.1 Pro policy before users see it, which helps teams standardize (or restrict) model choice centrally. At the same time, GitHub deprecated Gemini 3 Pro across Copilot experiences (Chat, inline edits, Ask/Agent/Edit modes, and completions) and points users to Gemini 3.1 Pro. This complements last week's “stable defaults” story: even with LTS models reducing churn, the wider lineup still changes, so teams should review internal docs, defaults, and enterprise policies, especially where policy enablement controls whether the replacement is selectable.
Copilot SDK and Copilot CLI: building blocks for agentic apps and terminal workflows
On the “build with Copilot” side, this week's Copilot SDK coverage moved from an intro to a full end-to-end app example. GitHub published a walkthrough for an AI-backed issue triage app (“IssueCrush”). The key architecture point is that the Copilot SDK depends on Node and manages a local Copilot CLI process via JSON-RPC, so the SDK runs server-side (Node/Express) while a React Native client uses GitHub OAuth + REST APIs to fetch issues. The tutorial emphasizes production-oriented patterns: reuse a long-lived SDK client, manage session lifecycle (start(), createSession(), sendAndWait() with timeouts, disconnect(), stop() in finally), and degrade gracefully when Copilot auth/subscription is missing (HTTP 403 with requiresCopilot, plus a metadata-based fallback summary). This echoes last week's “session forensics” mindset: bound, resume, and reason about agent work instead of treating it as chat output.
For terminal workflows, GitHub also highlighted Copilot CLI slash commands: /model to switch models mid-session (useful alongside last week's model attribution and this week's Gemini changes), /context to view token usage and avoid bloated sessions, and /resume to continue a previous session. These fit last week's push for more traceable, inspectable sessions.
- Building AI-powered GitHub issue triage with the Copilot SDK
- A beginner's guide to Copilot CLI slash commands
MCP-powered “agentic platform engineering”: Copilot beyond coding into CI/CD enforcement and AKS ops
This week's “agentic platform engineering” pattern continues last week's MCP/repo-native workflow progression: moving from “connect Copilot to tools” to “operationalize tool access with repeatable config, enforcement, and audit.” The approach starts by capturing operational knowledge in repos so Copilot can answer “how do I…?” grounded in conventions, IaC modules, and real environments (including reverse-engineering portal-built Azure into Terraform/Bicep). It then moves into enforcement by wiring Copilot-driven checks into GitHub Actions using standardized prompt files (.prompt.md under .github/prompts/) so teams can update rules without rewriting pipeline logic. This matches last week's “repo-visible instructions/skills” and “governed workflow participant” themes.
The final stage connects AKS health signals to agent triage. Argo CD detects unhealthy deployments, Argo CD Notifications posts a payload via repository_dispatch, an Actions workflow creates/dedupes structured issues, and a second workflow triggers a custom Copilot agent (“Cluster Doctor”) when a cluster-doctor label is applied. “Cluster Doctor” lives in .github/agents/cluster-doctor.agent.md with a collect->verify->diagnose->triage->remediate flow and safety constraints (verify cluster identity; avoid destructive actions without authorization), and it proposes fixes as PRs with humans approving. That lines up with this week's PR-native agent updates: PR-based remediation is more useful when agents can be invoked and iterated directly in the PR thread.
A key enabler is MCP: the repo includes .copilot/mcp-config.json to connect Copilot to a GitHub MCP server (issues/PRs) and an in-cluster AKS MCP server for telemetry and kubectl-based diagnostics, authenticated via Azure Workload Identity Federation. The emphasis is less “autonomous agent” and more “version operational playbooks as prompts/agents, enforce in CI, then turn GitOps signals into human-reviewed remediation PRs,” extending last week's MCP examples (Azure DevOps remote MCP, GitHub secret scanning via MCP, Fabric MCP) into end-to-end platform ops.
Copilot embedded in Microsoft tooling: SSMS GA, Azure App Service profiling fixes, and Fabric + MCP in VS Code
Copilot continued to show up as a first-class feature in Microsoft developer tools, reinforcing last week's theme that customization and tool wiring are becoming portable configuration rather than per-app prompt habits. SSMS 22.4.1 moved “GitHub Copilot in SSMS” from preview to GA, and added support for user-scoped custom instructions at %USERPROFILE%\\copilot-instructions.md so Copilot can stay consistent even for ad-hoc scripts outside a repo/solution. This complements last week's repo-visible instructions/skills: when there is no repo context (or you do not want one), user-level instructions can act as a set of defaults you control. The update also added more export formats (Excel, JSON, XML, Markdown), "Save with Encoding…", broader “group objects by schema” support beyond Fabric SQL databases, plus a new “SQL Projects (Preview)” entry and a roadmap note toward future “Agent mode.”
In VS Code, the Azure App Service extension added a “Code Optimizations” workflow that converts Application Insights Profiler findings into “Fix with Copilot” prompts. Items (CPU/memory, impact %, stack traces) appear under “Code Optimizations”; the extension maps stack traces to local methods, opens the code, and seeds Copilot Chat with the recommendation, stack trace, and method source to drive concrete refactors. It targets .NET web apps on App Service, with Windows/Linux differences in profiling enablement. Conceptually it matches last week's “give the agent real signals and context” thread, but here the signals come from production profiling rather than repo scanning.
On the data side, Microsoft Fabric updated its VS Code extension for workspace artifact management (browse folders, open item definitions; editing behind an “allow editing” setting), and introduced a pre-release Fabric MCP server extension for Copilot Chat. With MCP tools enabled, Copilot can interpret item definitions, work with Fabric REST APIs/docs, and run tenant/workspace operations (CRUD items, OneLake file operations, notebook creation/run) inside the editor. This continues last week's Fabric MCP storyline (local MCP GA/open source and remote MCP in preview): “Copilot acts through governed tools,” now packaged for day-to-day editor workflows.
- ‘SSMS 22.4.1: GitHub Copilot in SSMS GA, custom instructions, and new export formats’
- Code Optimizations for Azure App Service Now Available in VS Code
- Explore, edit, and organize Item definitions and Fabric MCP server in VS Code
Other GitHub Copilot News
Long-running usage data from a large OSS repo added practical “what works at scale?” guidance for coding agents. After last week's focus on operability (validation tuning, traceability, reporting), the .NET team's ten-month review of Copilot Coding Agent in dotnet/runtime provides concrete maintenance outcomes: 878 agent-authored PRs (14% of PRs) with ~68% merged rate for decided PRs. Results improved when the repo was prepared (documented build/test commands, conventions in .github/copilot-instructions.md, agent access to needed feeds). They also showed “pairing” matters: agent PRs with human commits merged far more often than fully hands-off ones, and strict expectations (like requiring benchmark evidence for performance PRs) still applied. This aligns with this week's PR-native invocation: pairing is easier when the agent works in the same PR thread reviewers already use, not in a separate stacked PR.
- Ten Months with Copilot Coding Agent in dotnet/runtime Work tracking integrations kept improving the “agent in the workflow” story. In GitHub Copilot for Jira public preview, setup guidance and errors improved, users can select a supported model directly from Jira comments, and traceability tightened with Jira keys in branch names and PR titles plus links back to tickets. For Confluence-heavy teams, it can pull Confluence context via MCP by configuring an Atlassian MCP server with a Confluence PAT, which is useful but should be evaluated within an org's permissions and data-access model. This parallels GitHub's own shift: as MCP becomes the common way to bring systems into the agent loop, integrations increasingly look like repeatable MCP configuration plus clear policy boundaries.
- GitHub Copilot for Jira — Public preview enhancements
Policy and governance stayed central, continuing last week's “defaults, attribution, reporting” direction with a privacy angle. GitHub announced a Copilot interaction data policy change effective April 24, 2026: Copilot Free/Pro/Pro+ will use interaction data for model training by default unless users opt out, while Copilot Business/Enterprise are unaffected. Developers using personal plans on proprietary code should review settings at
github.com/settings/copilot, and teams may want to document which account types are approved for which repos. Related guardrails guidance connected repo controls (like.github/copilot-instructions.mdand duplicate detection) with CI/CD enforcement and Azure-side governance (Content Safety, Azure AI Foundry, DLP for Copilot Studio, Entra/RBAC, audit/monitoring). Together with last week's model governance/traceability work, the message is consistent: if agents act in real workflows, teams need controls over both capabilities and data flows. - Updates to GitHub Copilot interaction data usage policy
- ‘Guardrails for Generative AI: Securing Developer Workflows’
Teams trying multi-model setups got a practical resilience pattern that echoes last week's multi-model review and “skills as shared assets” themes. Run Claude Code and Copilot CLI side-by-side, share as much repo configuration as possible (instructions, skills, MCP servers), and keep only tool-specific glue separate. The guidance includes concrete layouts (for example,
CLAUDE.mdas a single instructions source, syncing agent defs into.github/agents/*.agent.md, registering MCP servers in each tool's config) so tool switching during latency/errors does not require rebuilding your setup. It matches last week's lesson: reliability often comes from explicit, versioned configuration, not UI state. - Using Claude Code and GitHub Copilot CLI together for resilient agentic coding A DevX Summit talk republished this month used Copilot CLI to frame how agent-heavy development shifts daily work toward intent specification, decomposition, and verification. The practical skill is less prompting and more repeatable review/validation habits that keep humans accountable for what ships. This fits the last two weeks' arc: more agent autonomy and surfaces, paired with more traceability, governance, and “prove it” hooks.
- The Transformation of the Developer Role with AI Agents