Learn to use AI-powered Accelerator agents — from Agents to Hero
View the Project on GitHub devopsabcs-engineering/agentic-accelerator-workshop
| Duration | 20 minutes |
| Level | Beginner |
| Prerequisites | Lab 01 |
By the end of this lab, you will be able to:
Open .github/agents/security-reviewer-agent.agent.md in VS Code and study its structure.
Every agent file has two parts:
--- delimiters at the top) containing machine-readable metadata.Look at the frontmatter fields:
name: SecurityReviewerAgent
description: "Security-focused code reviewer that detects OWASP Top 10 vulnerabilities..."
model: Claude Sonnet 4.5 (copilot)
tools:
- read/readFile
- search/textSearch
# ... more tools
Note these key fields:
name identifies the agent in handoffs and Copilot Chat.description tells Copilot when to invoke this agent.tools lists the VS Code capabilities the agent can use.handoffs (when present) defines which other agents this agent can delegate to.Scroll down to the Markdown body and note the SARIF output requirement and the OWASP Top 10 checklist that guides the agent’s review.

The framework uses two design patterns to organize agents. Open the files below and identify which pattern each uses.
Pattern 1: Orchestrator with sub-agents
Open .github/agents/security-agent.agent.md. Notice the handoffs section in its frontmatter:
handoffs:
- label: "Review Application Code"
agent: SecurityReviewerAgent
- label: "Review CI/CD Pipelines"
agent: PipelineSecurityAgent
- label: "Review Infrastructure Code"
agent: IaCSecurityAgent
The Security Agent acts as an orchestrator. It does not perform deep analysis itself. Instead, it delegates to three specialized sub-agents based on the type of code under review.
Pattern 2: Detector and resolver pair
Open .github/agents/a11y-detector.agent.md. Notice its handoff:
handoffs:
- label: "🔧 Fix Accessibility Issues"
agent: A11yResolver
The A11y Detector finds accessibility violations and produces a report. It then offers a handoff to the A11y Resolver, which reads the report and applies code fixes. The Resolver can hand back to the Detector for verification.
This creates a detect → fix → verify cycle.
The framework has three supporting artifact types beyond agents. Open one example of each:
Skill — Open .github/skills/security-scan/SKILL.md.
A skill is a domain knowledge package. Agents load skills when they need deep context about a topic (OWASP categories, CWE mappings, severity classification). Skills are invoked on demand, not always active.
Instruction — Open .github/instructions/code-quality.instructions.md.
An instruction file contains always-on rules. The applyTo glob in its frontmatter (**/*.ts,**/*.js,...) tells Copilot to apply these rules automatically whenever matching files are edited. Instructions do not need to be invoked; they are active by default.
Prompt — Open .github/prompts/a11y-scan.prompt.md.
A prompt is a reusable template invoked on demand. It specifies an agent to handle the request and defines input variables (${input:url}, ${input:component}). Prompts standardize how you ask agents to perform common tasks.
Here is how the four artifact types relate:
| Artifact | Activation | Purpose |
|---|---|---|
| Agent | Invoked via @agent-name in Copilot Chat |
Performs analysis, makes decisions, produces output |
| Skill | Loaded by an agent when it needs domain knowledge | Provides reference data and procedures |
| Instruction | Always active based on applyTo file patterns |
Enforces rules and standards automatically |
| Prompt | Invoked on demand as a chat template | Standardizes common requests with input variables |

Two handoff chains are central to this framework. Trace each one using the agent files.
Chain 1: Accessibility — Detect, Fix, Verify
A11yDetector scans for WCAG 2.2 Level AA violations and produces a structured report.A11yResolver.A11yResolver reads the findings, applies code fixes, and offers a handoff back: “Verify Fixes” → A11yDetector.Chain 2: Code Quality — Detect, Generate, Verify
CodeQualityDetector analyzes coverage reports and identifies functions below the 80% threshold.TestGenerator.TestGenerator writes tests for the uncovered functions and offers a handoff back: “Verify Coverage” → CodeQualityDetector.Both chains follow the same loop: detect an issue, hand off for remediation, hand back for verification.
Before proceeding, verify:
name, description, tools, and handoffs fields in agent YAML frontmatterProceed to Lab 03.