| title | Agentic Accelerator Framework | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| description | A comprehensive framework leveraging custom GitHub Copilot agents, GitHub Advanced Security, and Microsoft Defender for Cloud to shift security and compliance left across security, accessibility, code quality, and FinOps domains with SARIF-based CI/CD integration. | ||||||||
| author | devopsabcs-engineering | ||||||||
| ms.date | 2026-03-17 | ||||||||
| ms.topic | overview | ||||||||
| keywords |
|
Agentic Accelerator = GitHub Advanced Security + GitHub Copilot Custom Agents + Microsoft Defender for Cloud
(GitHub preferred; Azure DevOps first-class citizen)
The Agentic Accelerator Framework provides a repeatable, org-wide approach to shifting security and compliance left using custom GitHub Copilot agents. It covers four domains — Security, Accessibility, Code Quality, and FinOps — with SARIF-based CI/CD integration across GitHub Actions and Azure DevOps.
The framework operates on a "shift-left then scale" principle:
- Shift Left: Custom GHCP agents run in VS Code (IDE) before commit and in GitHub platform during PR review.
- Automate: CI/CD pipelines (GitHub Actions + Azure DevOps Pipelines) run the same controls as automated gates.
- Report: All findings output SARIF v2.1.0 for unified consumption (GitHub Code Scanning + ADO Advanced Security).
- Govern: Security Overview + Defender for Cloud + Defender for DevOps + Power BI dashboards provide centralized governance.
graph TB
subgraph "Developer Workstation (VS Code)"
A[Custom GHCP Agents<br/>Security • A11y • Quality • FinOps] --> B[Pre-screened Code]
I[Instructions + Skills] --> A
P[Prompt Files] --> A
end
subgraph "GitHub Platform"
B --> C[Pull Request]
C --> D[Custom Agents<br/>Coding Agent + Code Review]
D --> E[GitHub Actions CI/CD]
E --> F[SARIF Results Upload]
end
subgraph "Security Controls Pipeline"
E --> G1[Secrets Scanning - Push Protection]
E --> G2[SCA - Dependabot + SBOM]
E --> G3[SAST - CodeQL + Copilot Autofix]
E --> G4[IaC Scanning - MSDO + Checkov + Trivy]
E --> G5[Container Image Scanning]
E --> G6[DAST - ZAP]
E --> G7[Accessibility - axe-core + IBM]
E --> G8[Code Coverage ≥80%]
E --> G9[Agent Config - APM audit]
G1 & G2 & G3 & G4 & G5 & G6 & G7 & G8 & G9 --> F
end
subgraph "Centralized Governance"
F --> H1[GitHub Security Overview]
F --> H2[Microsoft Defender for Cloud]
H2 --> H3[Defender for DevOps]
H1 --> H4[Security Campaigns + Autofix]
end
subgraph "Azure Cloud"
E --> AZ1[Azure Cost Management APIs]
AZ1 --> AZ2[FinOps Governance + Alerting]
end
| Domain | Agents | SARIF Category | Description |
|---|---|---|---|
| Security | SecurityAgent, SecurityReviewerAgent, SecurityPlanCreator, PipelineSecurityAgent, IaCSecurityAgent, SupplyChainSecurityAgent (6) | security/ |
Application and infrastructure security scanning |
| Accessibility | A11yDetector, A11yResolver (2) | accessibility-scan/ |
WCAG 2.2 Level AA compliance detection and remediation |
| Code Quality | CodeQualityDetector, TestGenerator (2) | code-quality/coverage/ |
Code coverage, linting, and test generation |
| FinOps | CostAnalysisAgent, FinOpsGovernanceAgent, CostAnomalyDetector, CostOptimizerAgent, DeploymentCostGateAgent (5) | finops-finding/v1 |
Azure cost optimization and governance |
This repository uses the .github-private org-wide layout where agent configuration directories are at the repo root:
agents/ ← 15 custom GHCP agent definitions (.agent.md)
instructions/ ← Path-specific instruction files (a11y-remediation, code-quality, wcag22-rules)
prompts/ ← Reusable prompt templates (a11y-fix, a11y-scan)
skills/ ← On-demand domain knowledge (a11y-scan, security-scan)
scripts/ ← Agent validation tooling (validate-agents.mjs)
apm.yml ← APM dependency manifest
mcp.json ← MCP server configuration (ADO work items)
.github/
CODEOWNERS ← Mandatory security-team review for agent config paths
copilot-instructions.md ← Repo-wide Copilot conventions
instructions/ ← Workflow instructions (ado-workflow)
skills/ ← Additional skills (docx, pdf, pptx, xlsx, Power BI)
workflows/ ← 7 GitHub Actions CI/CD pipelines
docs/ ← Framework documentation (9 guides)
sample-app/ ← Next.js demo application with Bicep infrastructure
samples/
azure-devops/ ← 3 sample ADO pipeline YAML files
| Workflow | Trigger | Purpose |
|---|---|---|
security-scan.yml |
PR and push to main |
SCA, SAST (CodeQL), IaC, container, and DAST scanning |
accessibility-scan.yml |
PR and weekly schedule | Three-engine a11y scan with threshold gating |
code-quality.yml |
PR | Lint, type check, test, and 80% coverage gate |
finops-cost-gate.yml |
PR (IaC file changes) | Infracost estimate against monthly budget |
apm-security.yml |
PR (agent config file changes) | APM audit for prompt file supply chain attacks |
ci-full-test.yml |
Push and PR to main |
Agent validation (structure, cross-refs, domain rules) |
deploy-to-github-private.yml |
Push to main |
Syncs agent config to org-wide .github-private repository |
- Clone this repository (or use as
.github-privatefor org-wide deployment). - Review the 15 agent definitions in
agents/. - Customize
instructions/andprompts/for your organization's standards. - Enable GitHub Actions workflows for CI/CD integration.
- Configure
mcp.jsonwith your Azure DevOps organization details. - Run
apm auditto validate agent configuration file integrity.
- Architecture — Framework architecture and design patterns
- Agent Patterns — Agent file specification and YAML frontmatter schema
- Agent Extensibility — Plugin architecture, MCP integration, and APM dependency management
- SARIF Integration — SARIF v2.1.0 mapping for all domains
- Platform Comparison — GitHub vs Azure DevOps feature comparison
- Azure DevOps Pipelines — ADO YAML pipeline equivalents for each workflow
- Centralized Governance — Dual-platform dashboards and Defender for Cloud integration
- Prompt File Security — Threat model and APM defense for agent configuration files
- Implementation Roadmap — Phased rollout plan
- SARIF v2.1.0: OASIS SARIF specification for unified findings output
- WCAG 2.2 Level AA: W3C accessibility standard
- OWASP Top 10: Application security risks
- OWASP LLM Top 10: AI/LLM security risks
- CIS Azure Benchmarks, NIST 800-53, PCI-DSS: Compliance frameworks
This project is licensed under the MIT License.