Skip to content

devopsabcs-engineering/agentic-accelerator-framework

Repository files navigation

title Agentic Accelerator Framework
description A comprehensive framework leveraging custom GitHub Copilot agents, GitHub Advanced Security, and Microsoft Defender for Cloud to shift security and compliance left across security, accessibility, code quality, and FinOps domains with SARIF-based CI/CD integration.
author devopsabcs-engineering
ms.date 2026-03-17
ms.topic overview
keywords
devsecops
github copilot
custom agents
github advanced security
microsoft defender for cloud
sarif
accessibility
finops

Overview

Agentic Accelerator = GitHub Advanced Security + GitHub Copilot Custom Agents + Microsoft Defender for Cloud

(GitHub preferred; Azure DevOps first-class citizen)

The Agentic Accelerator Framework provides a repeatable, org-wide approach to shifting security and compliance left using custom GitHub Copilot agents. It covers four domains — Security, Accessibility, Code Quality, and FinOps — with SARIF-based CI/CD integration across GitHub Actions and Azure DevOps.

The framework operates on a "shift-left then scale" principle:

  1. Shift Left: Custom GHCP agents run in VS Code (IDE) before commit and in GitHub platform during PR review.
  2. Automate: CI/CD pipelines (GitHub Actions + Azure DevOps Pipelines) run the same controls as automated gates.
  3. Report: All findings output SARIF v2.1.0 for unified consumption (GitHub Code Scanning + ADO Advanced Security).
  4. Govern: Security Overview + Defender for Cloud + Defender for DevOps + Power BI dashboards provide centralized governance.

Architecture

graph TB
    subgraph "Developer Workstation (VS Code)"
        A[Custom GHCP Agents<br/>Security • A11y • Quality • FinOps] --> B[Pre-screened Code]
        I[Instructions + Skills] --> A
        P[Prompt Files] --> A
    end

    subgraph "GitHub Platform"
        B --> C[Pull Request]
        C --> D[Custom Agents<br/>Coding Agent + Code Review]
        D --> E[GitHub Actions CI/CD]
        E --> F[SARIF Results Upload]
    end

    subgraph "Security Controls Pipeline"
        E --> G1[Secrets Scanning - Push Protection]
        E --> G2[SCA - Dependabot + SBOM]
        E --> G3[SAST - CodeQL + Copilot Autofix]
        E --> G4[IaC Scanning - MSDO + Checkov + Trivy]
        E --> G5[Container Image Scanning]
        E --> G6[DAST - ZAP]
        E --> G7[Accessibility - axe-core + IBM]
        E --> G8[Code Coverage ≥80%]
        E --> G9[Agent Config - APM audit]
        G1 & G2 & G3 & G4 & G5 & G6 & G7 & G8 & G9 --> F
    end

    subgraph "Centralized Governance"
        F --> H1[GitHub Security Overview]
        F --> H2[Microsoft Defender for Cloud]
        H2 --> H3[Defender for DevOps]
        H1 --> H4[Security Campaigns + Autofix]
    end

    subgraph "Azure Cloud"
        E --> AZ1[Azure Cost Management APIs]
        AZ1 --> AZ2[FinOps Governance + Alerting]
    end
Loading

Agent Inventory (15 Agents)

Domain Agents SARIF Category Description
Security SecurityAgent, SecurityReviewerAgent, SecurityPlanCreator, PipelineSecurityAgent, IaCSecurityAgent, SupplyChainSecurityAgent (6) security/ Application and infrastructure security scanning
Accessibility A11yDetector, A11yResolver (2) accessibility-scan/ WCAG 2.2 Level AA compliance detection and remediation
Code Quality CodeQualityDetector, TestGenerator (2) code-quality/coverage/ Code coverage, linting, and test generation
FinOps CostAnalysisAgent, FinOpsGovernanceAgent, CostAnomalyDetector, CostOptimizerAgent, DeploymentCostGateAgent (5) finops-finding/v1 Azure cost optimization and governance

Repository Structure

This repository uses the .github-private org-wide layout where agent configuration directories are at the repo root:

agents/                  ← 15 custom GHCP agent definitions (.agent.md)
instructions/            ← Path-specific instruction files (a11y-remediation, code-quality, wcag22-rules)
prompts/                 ← Reusable prompt templates (a11y-fix, a11y-scan)
skills/                  ← On-demand domain knowledge (a11y-scan, security-scan)
scripts/                 ← Agent validation tooling (validate-agents.mjs)
apm.yml                  ← APM dependency manifest
mcp.json                 ← MCP server configuration (ADO work items)
.github/
  CODEOWNERS             ← Mandatory security-team review for agent config paths
  copilot-instructions.md ← Repo-wide Copilot conventions
  instructions/          ← Workflow instructions (ado-workflow)
  skills/                ← Additional skills (docx, pdf, pptx, xlsx, Power BI)
  workflows/             ← 7 GitHub Actions CI/CD pipelines
docs/                    ← Framework documentation (9 guides)
sample-app/              ← Next.js demo application with Bicep infrastructure
samples/
  azure-devops/          ← 3 sample ADO pipeline YAML files

CI/CD Workflows

Workflow Trigger Purpose
security-scan.yml PR and push to main SCA, SAST (CodeQL), IaC, container, and DAST scanning
accessibility-scan.yml PR and weekly schedule Three-engine a11y scan with threshold gating
code-quality.yml PR Lint, type check, test, and 80% coverage gate
finops-cost-gate.yml PR (IaC file changes) Infracost estimate against monthly budget
apm-security.yml PR (agent config file changes) APM audit for prompt file supply chain attacks
ci-full-test.yml Push and PR to main Agent validation (structure, cross-refs, domain rules)
deploy-to-github-private.yml Push to main Syncs agent config to org-wide .github-private repository

Quick Start

  1. Clone this repository (or use as .github-private for org-wide deployment).
  2. Review the 15 agent definitions in agents/.
  3. Customize instructions/ and prompts/ for your organization's standards.
  4. Enable GitHub Actions workflows for CI/CD integration.
  5. Configure mcp.json with your Azure DevOps organization details.
  6. Run apm audit to validate agent configuration file integrity.

Documentation

Standards

  • SARIF v2.1.0: OASIS SARIF specification for unified findings output
  • WCAG 2.2 Level AA: W3C accessibility standard
  • OWASP Top 10: Application security risks
  • OWASP LLM Top 10: AI/LLM security risks
  • CIS Azure Benchmarks, NIST 800-53, PCI-DSS: Compliance frameworks

License

This project is licensed under the MIT License.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors