Every MR gets the
context it deserves
Write a flow once. Let it analyze your merge request and post a structured context brief — automatically.
Flows
THE DIFFERENCE
From noise to clarity
A typical MR shows what changed. Context Brief shows what you actually need to know.
MR Description
"Added password reset flow"
Reviewer reconstructs context from the diff alone. Time wasted.
What changed
- Added password reset endpoint in
reset.ts - Updated token validation logic
- New
recovery_tokensmigration
Risk level
Hidden assumptions
- Token expiry enforced server-side only
- Session invalidation is asynchronous
Full context in under 10 seconds.
SAMPLE OUTPUT
The Context Brief
Exactly what gets posted as a comment on the merge request. Seven sections, scannable in under 10 seconds.
🔍Context Brief
- Added
POST /api/v1/auth/reset-passwordinsrc/api/auth/reset.ts - Updated token validation in
token-service.tsfor single-use recovery tokens - Added
PasswordResetFormcomponent with rate-limit UX - New migration
20260320_add_recovery_tokens_table.sql - Updated password-reset email template with branding
- Added integration tests for the reset endpoint
This MR introduces self-service password recovery, changing the authentication flow to allow users to reset credentials without admin intervention. It touches token generation, email delivery, and user settings — three areas tightly coupled to session management and account security.
- Auth middleware — token validation path now includes recovery type
- Email delivery service — new template registration
- User settings page — new recovery flow entry point
- Session management — sessions invalidated after reset
- Rate limiting — reset endpoint needs its own bucket
- Recovery tokens are single-use server-side, but client does not prevent double-submission
- Email provider may retry delivery, sending multiple reset links
- UI assumes user is logged out after reset, but session invalidation is asynchronous
- Migration is irreversible — rollback drops all recovery token history
- Verify expired-token behavior returns 401
- Verify replay protection (single-use enforcement)
- Verify concurrent request handling on same token
- Verify session invalidation ordering
- Verify rate limiting on reset endpoint
- Verify test coverage for failure paths
- Update auth flow documentation with recovery path
- Add password-reset architecture note
- Document recovery_tokens table schema
- Add rate-limiting config to ops runbook
HOW IT WORKS
From setup to automation
in 3 simple steps
STEP 1
INTEGRATING…Connect your existing tools
Assign the agent as a reviewer or mention it in a comment. The flow launches automatically.
STEP 2
PROCESSING…Analyze every change
The agent gathers MR metadata, diffs, and commits. It classifies changes, infers intent, and detects hidden assumptions.
STEP 3
COMPLETEPost the brief instantly
A structured Context Brief is posted directly as a merge request note. Seven sections, zero config.
FULL TOOLSET
CUSTOMIZATION
Configure per project
Tune agent behavior through the flow prompt and AGENTS.md. Every setting is optional.
Sections
Toggle brief sections on or off
Risk sensitivity
Adjust flagging threshold
Posting mode
Auto or manual trigger
Flow preview
Live config summary
environment: ambient
components:
- name: context_brief_agent
type: AgentComponent
OPEN SOURCE
Automate context.
Ship faster.
Built for the GitLab AI Hackathon. One flow, one agent, one comment that saves every reviewer's time.