Weekly GitHub Copilot Roundup: Agents Everywhere, Guardrails Tighten
This week’s Copilot updates kept moving past the “chat + autocomplete” baseline toward agents that work across the web, IDE, CLI, and mobile, with more governance and observability as usage scales. Building on last week’s shift toward agent work inside PRs/Issues/Projects and better operability (logs, validations, admin controls, reporting), this week extends that direction in two ways: more entry points for agent work (branch-first, mobile/Slack) and tighter enterprise guardrails (runner and firewall controls, signed commits, org-wide instructions). Model availability is also changing quickly, so teams that pin models or enforce policies should plan regular housekeeping to avoid surprises.
Copilot cloud agent on GitHub.com: branch-first workflows, planning, research, and tighter org controls
After last week’s PR-native improvements (comment @copilot on an existing PR, update the current PR by default, and resolve merge conflicts with logs and validations), Copilot cloud agent (formerly the Copilot coding agent) can now work directly on a branch without automatically opening a PR. Teams can iterate privately, review the evolving diff, and open a PR only when they are ready, while still requesting auto-created PRs when that is preferred. This pairs last week’s “iterate within the same PR thread” flow with a pre-PR staging mode.
The agent also added two changes aimed at reducing unexpected diffs. First, it can draft an implementation plan before coding so you can approve or adjust the approach up front. Second, “deep research” sessions let it answer broader repo-grounded questions, which can help with impact analysis and design trade-offs, especially when combined with last week’s expanded agent visibility in Issues/Projects.
As more teams adopt it, GitHub added org-level controls for where the cloud agent runs and what it can reach. Platform teams can set (and optionally lock) which Actions runner executes agent tasks (GitHub-hosted, Large, or self-hosted) without managing runner choice repo-by-repo via copilot-setup-steps.yml. Org admins can also centrally manage the agent firewall (on/off, recommended allowlist, custom allowlist, and whether repos can add entries), which affects workflows that fetch dependencies, call external services, or reach internal registries. Together, these continue last week’s “automatable rollout” direction at two early control points: network egress and compute placement.
Supply-chain and compliance workflows got easier as well: the cloud agent now signs every commit it creates. Agent commits show as “Verified” and work in repos that enforce “Require signed commits” via branch protection/rulesets. Combined with last week’s traceability (session logs, issue sidebar status, PR-thread invocation), commit provenance becomes part of the default setup as agents become regular commit authors.
- Research, plan, and code with Copilot cloud agent
- Put GitHub Copilot cloud agent to work: research, plan, and code on github.com
- Organization runner controls for Copilot cloud agent
- Organization firewall settings for Copilot cloud agent
- Copilot cloud agent signs its commits
Copilot in Visual Studio and VS Code: custom agents, agent sessions, and more IDE-native workflows
In Visual Studio, Copilot’s March update focused on making agent behavior portable and repeatable across repos, which mirrors last week’s repo-visible instructions/skills and this week’s GitHub.com plan/research work. Teams can define custom agents as *.agent.md files under *.github/agents/* and expose them in Visual Studio’s agent picker, with settings such as workspace awareness, tool access, preferred model, and MCP connections. Visual Studio also added “agent skills” as reusable instruction sets stored in the repo (shared defaults) or the user profile (personal defaults), which are auto-discovered during workflows. This fits the “configuration scales” theme and helps keep IDE and GitHub.com agents aligned per repo.
Agent mode also gained a navigation tool that relies on language services rather than text search: find_symbol locates and reasons about symbols across the project. It supports C++, C#, Razor, TypeScript, and LSP-backed languages, which helps refactors avoid missed call sites or scope/type mistakes, especially as last week’s PR/issue workflows encourage larger agent changes.
The update also brought Copilot into IDE performance and security loops. “Profile with Copilot” in Test Explorer runs a specific test via a Profiling Agent and analyzes CPU/instrumentation data (called out for .NET tests). During debugging, PerfTips now use live profiling, and a Profiler Agent captures elapsed time/CPU/memory signals so Copilot can suggest optimizations when you hit a slowdown. For dependency hygiene, Visual Studio can remediate vulnerable NuGet packages from Solution Explorer via “Fix with GitHub Copilot,” which turns detection into an in-IDE update loop. This continues last week’s “give the agent real signals” thread, but shifts it from external telemetry to built-in diagnostics and security findings.
In VS Code, Copilot kept becoming more “session-aware,” matching last week’s traceable sessions/logs (issue sidebar status, PR-linked logs, CLI /context and /resume). VS Code 1.114 highlights centered on Copilot Chat usability, including richer media in the chat carousel, copy as Markdown, improved troubleshooting, and updates to the #codebase grounding command. VS Code 1.115 Insiders added more session state (restore agent edits with diffs and undo/redo), exposed entitlements/usage inside Sessions, and expanded session context to include the integrated browser (tracking tabs the agent used). Terminal automation also improved: background terminals can notify the agent on completion with exit codes/output, input prompts are surfaced to avoid silent stalls, and send_to_terminal supports confirmed command dispatch to background terminals. Remote workflows improved with an SSH path that installs the VS Code CLI and starts agent host mode on remote machines. Overall, last week made agents more present in GitHub collaboration surfaces, and this week makes editor/terminal work easier to resume, audit, and drive with more explicit control.
- GitHub Copilot in Visual Studio — March update
- Visual Studio March Update – Build Your Own Custom Agents
- What's hot in VS Code v1.114? 🔥
- Visual Studio Code 1.115 (Insiders): agent sessions, Copilot entitlements, SSH agent host mode
Copilot CLI and Copilot SDK: multi-agent orchestration and a reusable agent runtime
Copilot CLI added multi-agent execution via the /fleet command. /fleet breaks a goal into work items, runs sub-agents in parallel, then validates and synthesizes results into your working tree. In real repos, the details matter: each sub-agent has its own context window, they share the filesystem, and they do not coordinate directly, so prompts should specify file ownership to avoid collisions (or stage outputs in temp paths and merge). It builds on last week’s CLI focus on session controls (/model, /context, /resume) by adding an orchestration pattern that does not depend on one long context thread.
GitHub also released the Copilot SDK in public preview (the same agent runtime used by Copilot cloud agent and Copilot CLI), so teams can embed agent interactions in internal apps without building orchestration from scratch. This extends last week’s Copilot SDK “IssueCrush” walkthrough into a shared runtime rather than a one-off pattern. The SDK includes tool invocation, stateful multi-turn sessions, streaming, built-in file ops, and a permissions/approval framework (including read-only tools that can bypass approvals). It supports blob attachments (images/screenshots without temp files) and OpenTelemetry tracing with W3C Trace Context propagation, extending last week’s “traceable logs” theme into standard telemetry pipelines. BYOK (OpenAI, Azure AI Foundry, Anthropic) keeps model/provider flexible while standardizing the runtime. The preview ships for Node/TypeScript, Python, Go, .NET, and Java.
GitHub also published an SDK demo that adds planning flows to a Node.js app (meal plans and weekend schedules), with an emphasis on regeneration as constraints change. The takeaway is how to wire an app to SDK sessions and support iterative refinement without restarting, which lines up with this week’s “plan first” in Copilot cloud agent and last week’s repeatable session lifecycles.
- Run multiple agents at once with /fleet in Copilot CLI
- Copilot SDK in public preview
- Build a Planning App with the GitHub Copilot SDK | demo
- Not sure where to start with the GitHub Copilot SDK?
MCP + Azure workflows: Copilot-assisted scaffolding, deployments, and repo-grounded research pipelines
Copilot’s “agent + tools” story showed up across Azure workflows, extending last week’s MCP thread: connect Copilot to tools, then operationalize access with versioned config, enforcement, and audit. Azure Developer CLI (azd) shipped a preview “Set up with GitHub Copilot” path in azd init, using a Copilot agent to scaffold a project and align it to azd conventions (templates, azure.yaml, service detection), with guardrails like dirty-directory checks and consent before enabling MCP server tooling. The same release added AI-assisted troubleshooting for failed commands (explain/guidance/troubleshoot/skip), with an option to apply a fix and retry from the terminal. azd’s extension SDK also added MCP utilities and a new CopilotService gRPC service so extensions can use agent capabilities (sessions/messages/usage metrics), which matches last week’s “turn playbooks into tool-driven flows” pattern.
An “Azure Skills Plugin” cookbook also published many copy/paste prompts for Copilot Chat (Agent mode) and Copilot CLI to automate Azure tasks end-to-end: repo analysis and infra generation (azure-prepare), validation (azure-validate), deployment via azd (azure-deploy), plus diagnostics via KQL, RBAC/compliance checks, Entra app registrations, and AI service setup (Azure AI Search, API Management as an AI gateway, Foundry tasks). The theme is chaining skills into prepare → validate → deploy pipelines while keeping explicit per-skill calls for tighter control, similar to last week’s “standardized prompt files in CI,” expressed here as skill chains.
Project Nighthawk provided a concrete pattern for repo-grounded research in VS Code: a multi-agent pipeline that searches locally cloned repos (kept current via git pull), consults Microsoft Learn via an MCP server, synthesizes a cited Markdown report, and runs a fact-checker that validates claims and flags unverified statements. For deep technical investigations, this extends last week’s “observability + verification” mindset into reviewable research artifacts, especially now that this week adds “deep research” sessions to Copilot cloud agent.
- Azure Developer CLI (azd) – March 2026: Run and Debug AI Agents Locally, GitHub Copilot Integration, & Container App Jobs
- Building with Azure Skills: a prompt cookbook for the Azure plugin (MCP server)
- Project Nighthawk: A Research Agent Built for Field Engineering
Other GitHub Copilot News
Org-level governance and reporting kept closing admin gaps, building on last week’s repo allowlisting and usage metrics flagging used_copilot_coding_agent. Organization custom instructions are now GA for Copilot Business and Enterprise, so admins can set defaults across Copilot Chat on github.com, Copilot code review, and Copilot cloud agent. Usage reporting also expanded: org reports now include per-user Copilot CLI activity (session/request counts, tokens, average tokens per request, last known CLI version) via the Copilot usage metrics REST API (apiVersion=2026-03-10). Together with last week’s agent-user metric, this helps distinguish “used Copilot” from “ran agents” from “drove terminal automation,” as entry points expand beyond IDEs.
- Copilot organization custom instructions are generally available
- Copilot usage metrics now includes per-user GitHub Copilot CLI activity in organization reports Model availability shifted again, with two deprecations that matter for teams pinning models or enforcing policies, which continues last week’s reminder that model lifecycles change quickly (for example, Gemini 3 Pro exiting for Gemini 3.1 Pro). GPT-5.1 Codex variants (GPT-5.1-Codex, -Mini, -Max) were deprecated April 1, 2026, with GPT-5.3-Codex as the replacement. Claude Sonnet 4 is scheduled for deprecation on 2026-05-01 with Claude Sonnet 4.6 suggested. On the adoption side, GPT-5.4 mini is now GA for Copilot Student via auto model selection in Copilot Chat across major IDEs.
- GPT-5.1 Codex, GPT-5.1-Codex-Max, and GPT-5.1-Codex-Mini deprecated
- Upcoming deprecation of Claude Sonnet 4 in GitHub Copilot
- GPT-5.4 mini is now available in Copilot Student auto model selection Copilot’s “where work starts” expanded beyond IDEs into Slack and mobile, extending last week’s “agents show up where teams collaborate” shift into chat and on-the-go triage. The GitHub app for Slack can now create Issues from natural-language prompts (including sub-issues), supports thread-based refinement of metadata, and offers an in-Slack flex pane to view the issue. GitHub Mobile also made sessions and delegation easier: a dedicated Copilot tab (notably on Android), native session logs, stop sessions and create PRs from completed sessions, plus a faster “Assign an Agent” flow from an issue (custom instructions and optional repo selection). The pattern across two weeks is consistent: as agents act in more places, GitHub adds workflow hygiene (logs, status visibility, and mobile-native controls) so activity stays reviewable.
- Create issues from Slack with Copilot
- GitHub Mobile: Stay in flow with a refreshed Copilot tab and native session logs
- GitHub Mobile: Faster, more flexible agent assignment from issues Several items focused on practical guidance for shaping Copilot behavior, from agent-first repo practices to prompt patterns and repo-level instruction files. This mirrors last week’s dotnet/runtime lessons (“prepare the repo, document commands/conventions, pair with humans”) and this week’s move toward org-wide defaults (custom instructions GA). GitHub’s Applied Science team described an agent-driven loop around Copilot CLI (planning, autopilot-style execution, iterative Copilot Code Review, then human review), with an emphasis on repo navigability (structure, naming, docs, tests, dead-code removal) and CI guardrails (typing, linters, layered tests) so agents can self-correct. Other posts covered prompting Copilot to ask clarifying questions before implementing, and adding a repo “tone of voice”/instructions file to make Copilot review more strict.
- Agent-driven development in Copilot Applied Science
- Let GitHub Copilot Ask First
- GitHub Copilot Is Too Nice. Fix It With a Tone of Voice File. Copilot also showed up in modernization and security enablement content. Videos covered using Copilot to assess legacy .NET apps, draft modernization plans, and convert them into task lists (including Copilot Modernization in VS Code). A GitHub Security intro positioned Copilot Autofix alongside Dependabot, secret scanning, and code scanning to shorten the initial remediation loop. This follows last week’s thread of turning assistant output into workflow steps, but framed around modernization and remediation rather than feature work.
- How can AI help me modernize my app?
- Using GitHub Copilot in VS Code to plan a .NET Framework to modern .NET migration
- VS Code Live: Modernizing legacy .NET apps with GitHub Copilot Modernization in VS Code
- Getting started with GitHub security (secret scanning, Dependabot, code scanning, Copilot Autofix) Infrastructure-as-code teams got more “Copilot + guardrails” examples in VS Code, continuing last week’s “agentic platform engineering” message: version playbooks, use deterministic checks, keep humans in approvals. One walkthrough showed a repo-scoped VS Code custom agent (1.99+) for Terraform security scanning with structured findings (severity + stable IDs, file/line, remediation, mappings to CIS/ASB v3/NIST), paired with TFLint and SARIF output. Another tutorial described a VS Code extension that scaffolds Terraform from centrally managed module templates and uses Copilot to draft configuration, while keeping deterministic validation/compliance enforcement in extension code (explicitly avoiding MCP) so AI output stays draftable but constrained.
- VS Code Custom Agents: AI-Powered Terraform Security Scanning in the IDE
- Building a VS Code extension to scaffold Terraform with guardrails and GitHub Copilot A governance-focused analysis flagged an upcoming Copilot data policy change, following last week’s official policy update and guardrails guidance. Copilot Free/Pro/Pro+ will allow training on “interaction data” unless users opt out, while Copilot Business and Enterprise are not affected. It reviews enforcement options (central licensing, network controls, IDE policy packs, managed identities/data residency) for orgs that want to avoid relying on opt-out behavior and keep usage on commercial tiers.
- GitHub Copilot will start training on your interactions A few community and onboarding items fit the two-week trend of agents as normal workflow participants. These include quick-start content for installing Copilot CLI, a beginner workflow using CLI “plan” and “delegate” to hand work to a background cloud agent then review PRs from the terminal, and an event announcement for Copilot Dev Days.
- How to install GitHub Copilot CLI in seconds
- Copilot CLI for beginners: Plan, delegate, and review
- GitHub Copilot Dev Days are Here! We're in Chennai on 4/11