Skip to the content.

Core Formula

The framework operates on a single unifying equation:

Agentic Accelerator = GitHub Advanced Security + GitHub Copilot Custom Agents + Microsoft Defender for Cloud

GitHub is the preferred platform. Azure DevOps is a first-class citizen.

Shift-Left Then Scale

The framework follows a four-step principle that moves quality gates as close to the developer as possible and then scales enforcement across the organization.

  1. Shift Left: Custom GitHub Copilot (GHCP) agents run in VS Code before commit and on the GitHub platform during pull request review.
  2. Automate: CI/CD pipelines (GitHub Actions and Azure DevOps Pipelines) run the same controls as automated gates.
  3. Report: All findings output SARIF v2.1.0 for unified consumption through GitHub Code Scanning and ADO Advanced Security.
  4. Govern: Security Overview, Defender for Cloud, Defender for DevOps, and Power BI dashboards provide centralized governance.

Architecture Diagram

graph TB
    subgraph "Developer Workstation (VS Code)"
        A[Custom GHCP Agents<br/>Security - A11y - Quality - FinOps] --> B[Pre-screened Code]
        I[Instructions + Skills] --> A
        P[Prompt Files] --> A
    end

    subgraph "GitHub Platform"
        B --> C[Pull Request]
        C --> D[Custom Agents<br/>Coding Agent + Code Review]
        D --> E[GitHub Actions CI/CD]
        E --> F[SARIF Results Upload]
    end

    subgraph "Security Controls Pipeline"
        E --> G1[Secrets Scanning - Push Protection]
        E --> G2[SCA - Dependabot + SBOM]
        E --> G3[SAST - CodeQL + Copilot Autofix]
        E --> G4[IaC Scanning - MSDO + Checkov + Trivy]
        E --> G5[Container Image Scanning]
        E --> G6[DAST - ZAP]
        E --> G7[Accessibility - axe-core + IBM]
        E --> G8[Code Coverage >= 80%]
        E --> G9[Agent Config - APM audit]
        G1 & G2 & G3 & G4 & G5 & G6 & G7 & G8 & G9 --> F
    end

    subgraph "Centralized Governance"
        F --> H1[GitHub Security Overview]
        F --> H2[Microsoft Defender for Cloud]
        H2 --> H3[Defender for DevOps]
        H1 --> H4[Security Campaigns + Autofix]
    end

    subgraph "Azure Cloud"
        E --> AZ1[Azure Cost Management APIs]
        AZ1 --> AZ2[FinOps Governance + Alerting]
    end

Agent Domain Categories

The framework organizes 15 agents into four domains, each producing SARIF-compliant output for centralized governance.

Domain Agents SARIF Category Reference Repository
Security SecurityAgent, SecurityReviewerAgent, SecurityPlanCreator, PipelineSecurityAgent, IaCSecurityAgent, SupplyChainSecurityAgent (6) security/ .github-private
Accessibility A11yDetector, A11yResolver (2) accessibility-scan/ accessibility-scan-demo-app
Code Quality CodeQualityDetector, TestGenerator (2) code-quality/coverage/ This repository
FinOps CostAnalysisAgent, FinOpsGovernanceAgent, CostAnomalyDetector, CostOptimizerAgent, DeploymentCostGateAgent (5) finops-finding/v1 cost-analysis-ai

Four-Level Deployment Model

Custom agents deploy at four levels with lowest-level-wins precedence.

Level Location Availability
Enterprise agents/ in enterprise .github-private All enterprise repos
Organization agents/ in org .github-private All org repos
Repository .github/agents/ in the repo That repo only
User profile ~/.copilot/agents/ All user workspaces (VS Code)

The same .agent.md file works in VS Code, GitHub.com coding agent, GitHub CLI, and JetBrains IDEs. Omitting the target field enables cross-platform support.

SARIF v2.1.0 as Universal Interchange Format

All scan tools in the framework output SARIF v2.1.0 and upload results to GitHub Code Scanning or ADO Advanced Security. This creates a single pane of glass for security, accessibility, code quality, and cost findings.

Requirements for GitHub consumption:

Limits: 10 MB gzip compressed, 25,000 results per run, 20 runs per file.

Dual-Platform Data Flows

GitHub Path

Scan Tools --> SARIF Upload --> GitHub Code Scanning --> Security Overview
                                                       |
                                          Defender for Cloud (GitHub Connector)
                                                       |
                                          Defender for DevOps Console

Azure DevOps Path

Pipeline Tasks --> SARIF --> ADO Advanced Security --> ADO Security Overview (UI)
                                                     |
                                        Defender for Cloud (ADO Connector)
                                                     |
                                        Defender for DevOps Console
                                                     |
                              Power BI AdvSec Report (advsec-pbi-report-ado)

Complementary Dashboards

Dashboard Platform Capabilities Gaps Addressed
GitHub Security Overview GitHub Org-wide alerts, filter by severity/rule/category, Security Campaigns Full-featured
ADO Security Overview ADO Org-level risk and coverage tabs UI-only, no API, limited customization
Power BI AdvSec Report ADO Star schema, DAX measures, multi-org, trend analysis, Mean Time to Fix Compensates for ADO Security Overview API gap
Defender for Cloud Both Unified cross-platform view, attack path analysis, runtime protection Aggregates both platforms
Defender for DevOps Both DevOps-specific findings across GitHub, ADO, and GitLab Cross-platform visibility

References