Learn to use AI-powered Accelerator agents — from Agents to Hero
View the Project on GitHub devopsabcs-engineering/agentic-accelerator-workshop
| Duration | 30 minutes |
| Level | Intermediate |
| Prerequisites | At least one of Lab 03, Lab 04, or Lab 05 |
By the end of this lab, you will be able to:
Open the SARIF file and explore its JSON structure to understand how agent findings are stored.
validation-results.sarif from the repository root. The file opens as a standard JSON document.$schema field. This points to the SARIF v2.1.0 JSON schema and tells processors which specification version to validate against.version field. It should read "2.1.0".Expand the runs[] array. Each run represents one tool execution. Inside a run, identify these fields:
| Field | Purpose |
|---|---|
tool.driver.name |
Name of the agent or scanner that produced the results |
tool.driver.rules[] |
Rule definitions with unique ruleId values per finding type |
results[] |
Array of individual findings |
automationDetails.id |
Category string used for grouping (for example, security/) |
Inside a single result entry, locate:
| Field | Purpose |
|---|---|
ruleId |
Unique identifier for the rule that triggered the finding |
level |
Severity level (error, warning, or note) |
message.text |
Human-readable description of the finding |
locations[] |
File path and line number where the issue was detected |
partialFingerprints |
Stable hashes used for deduplication across multiple runs |

The SARIF Viewer extension provides a graphical interface for navigating findings without reading raw JSON.
validation-results.sarif in the VS Code Explorer panel.
locations[] field you examined in Exercise 6.1. Both should point to the same file and line number.
The Agentic Accelerator Framework uses category prefixes in the automationDetails.id field to organize findings by domain.
Review the category prefix system:
| Prefix | Domain | Example Agents |
|---|---|---|
security/ |
Security scanning | SecurityReviewerAgent, IaC Security Agent, Supply Chain Agent |
accessibility-scan/ |
Accessibility | A11Y Detector, A11Y Resolver |
code-quality/coverage/ |
Code quality | Code Quality Detector, Test Generator |
finops-finding/v1 |
FinOps governance | Cost Analysis Agent, Cost Optimizer Agent |
Understand the severity mapping between SARIF levels and framework classification:
| SARIF Level | Framework Severity | Action Required |
|---|---|---|
error |
CRITICAL or HIGH | Must remediate before merge |
warning |
MEDIUM | Address in current sprint |
note |
LOW | Track for future improvement |
automationDetails entries. Identify which category prefix each run uses.
This exercise explains the pipeline from SARIF file to GitHub Security tab. Labs 07 and 08 will walk you through the process hands-on.
Understand the SARIF upload flow:
Agent produces findings
↓
Results written as SARIF v2.1.0 JSON
↓
GitHub Actions workflow runs upload-sarif action
↓
GitHub Code Scanning processes the SARIF file
↓
Findings appear in Security → Code scanning alerts
github/codeql-action/upload-sarif@v4 action in each workflow handles the upload. The category input on the upload step matches the automationDetails.id prefix so GitHub can group alerts by domain.partialFingerprints. A finding that already exists from a previous run will not create a duplicate alert.Before proceeding, verify:
$schema, version, runs[], results[], and partialFingerprintsProceed to Lab 07 to enable GitHub Actions workflows and trigger them with a pull request.