Learn to use AI-powered Accelerator agents — from Agents to Hero
View the Project on GitHub devopsabcs-engineering/agentic-accelerator-workshop
| Duration | 40 minutes |
| Level | Intermediate |
| Prerequisites | Lab 00 through Lab 06 |
By the end of this lab, you will be able to:
Explore the four workflow files included in the repository to understand what each one does.
.github/workflows/security-scan.yml in VS Code. This is the most comprehensive workflow in the set.Identify the key structural elements:
| Element | Value | Purpose |
|---|---|---|
on.push.branches |
[main] |
Triggers on pushes to main |
on.pull_request.branches |
[main] |
Triggers on PRs targeting main |
permissions.security-events |
write |
Allows SARIF upload to Security tab |
jobs |
Multiple jobs | SCA, SAST, IaC, Container, DAST scans |
github/codeql-action/upload-sarif@v4 to send findings to the GitHub Security tab.Review the remaining three workflows briefly:
| Workflow File | Name | Trigger | SARIF Category |
|---|---|---|---|
accessibility-scan.yml |
Accessibility Scan | PR + weekly schedule | accessibility-scan/ |
code-quality.yml |
Code Quality | PR only | code-quality/coverage/ |
finops-cost-gate.yml |
FinOps Cost Gate | PR (infra file changes) | finops-finding/ |
category values ensure findings are grouped by domain.
Confirm that GitHub Actions is enabled and permissions are configured correctly for your forked repository.
anchore/sbom-action and github/codeql-action.GITHUB_TOKEN. The workflows need write access to upload SARIF files to the Security tab.[!TIP] If your organization enforces stricter policies, you may need to ask an administrator to allow the specific actions used in these workflows.
Create a branch, make a small change, and open a pull request to trigger the workflow runs.
Open a terminal in VS Code and create a new branch:
git checkout -b feature/test-pipeline
Open sample-app/src/app/page.tsx and make a visible change. For example, add a comment at the top of the file:
// Test change to trigger pipeline workflows
Stage, commit, and push the change:
git add sample-app/src/app/page.tsx
git commit -m "test: trigger pipeline scan"
git push -u origin feature/test-pipeline
main, add a descriptive title such as “Test pipeline trigger”, and click Create pull request.
Watch the workflows run and explore the execution logs.

Click a specific job to expand its step-by-step logs. Look for:

[!IMPORTANT] Do not merge or close this pull request yet. Lab 08 requires the workflow results to be available in the Security tab.
Before proceeding, verify:
security-scan.yml and identified trigger events, jobs, and the SARIF upload stepmainProceed to Lab 08 to explore the uploaded SARIF results in the GitHub Security tab.