You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Five-phase implementation roadmap for the Agentic Accelerator Framework with status tracking, proof-of-value examples for each domain, cross-cutting governance integration, and a Gantt-style timeline.
ms.date
2026-03-17
ms.topic
overview
Roadmap Overview
The framework rolls out across five phases, each introducing a new agent domain. Phases 1 and 2 leverage proven implementations. Phases 3 through 5 build on established patterns with new agent definitions. Cross-cutting centralized governance applies to all phases.
Demonstrated at the TT343 session ("Agentic AI for DevSecOps: Transforming Security with GHAS and GHCP") with a live demo using the gh-advsec-devsecops repository. Six custom agents produced actionable security reports covering OWASP Top 10, CIS Azure benchmarks, pipeline hardening, IaC misconfiguration, and supply chain risks.
A three-engine accessibility scanner (axe-core, IBM Equal Access, custom Playwright checks) produces SARIF output compliant with WCAG 2.2 Level AA. The scanner integrates with GitHub Actions for CI gating and uploads results to Code Scanning. Findings flow through to Defender for Cloud for centralized governance.
The Detector and Resolver agent pair demonstrates the handoff pattern: the Detector identifies violations using static and runtime analysis, hands off to the Resolver for automated remediation, and then re-scans for verification.
Actions
Onboard additional applications for accessibility scanning
Add scheduled production URL scans via cron workflows
Expand custom Playwright checks based on organizational patterns
Phase 3: Code Quality Agents
Attribute
Detail
Status
Active — agents defined, coverage gate implemented, domain skill and scaffolding artifacts created
Agents
CodeQualityDetector, TestGenerator
SARIF Category
code-quality/coverage/
Proof of Value
A coverage gate that fails the CI pipeline when code coverage drops below 80% for any file or function. Below-threshold functions are reported as SARIF results, appearing in GitHub Code Scanning alongside security and accessibility findings. The Test Generator agent reads uncovered functions and produces tests covering happy path and error paths.
Implementation Pattern
Follows the Detector and Resolver pattern from Accessibility:
A deployment cost gate that blocks infrastructure changes exceeding the defined budget. The agent queries Azure Cost Management APIs, evaluates proposed IaC changes against budget constraints, and produces SARIF findings for budget overspend, cost anomalies, untagged resources, and optimization opportunities. Findings appear in Code Scanning alongside security alerts.
Azure Cost Management API Integration
API
Purpose
Cost Management Query
Ad-hoc cost queries by tag, resource group, or service
Budgets
Create and manage cost budgets with alerts
Exports
Recurring CSV to Azure Storage
Scheduled Actions
Anomaly detection alert rules
Forecasts
Project future costs
Azure Advisor
Optimization recommendations
Actions
Five agent definitions are in place in agents/
Roll out organization-wide via .github-private using deploy-to-github-private.yml
Integrate with Azure Cost Management SDK
Enforce deployment cost gate via finops-cost-gate.yml workflow
Implement repository-to-cost attribution through ProjectName tagging
Phase 5: Prompt File Security
Attribute
Detail
Status
Active — APM audit workflow implemented, CODEOWNERS protection in place
Key Tool
APM (Agent Package Manager) by Daniel Meppiel
SARIF Category
agent-config-scan/
Proof of Value
APM's apm audit command detects hidden Unicode characters (zero-width spaces, bidi overrides, tag characters, Glassworm attack vectors) embedded in agent configuration files. The microsoft/apm-action GitHub Action integrates this scanning into CI/CD, blocking compromised agent configurations before they reach production. Combined with CODEOWNERS protection for agent config directories, this creates defense-in-depth for the AI supply chain.
APM Content Security Scanning
Severity
Detections
Critical
Tag characters (U+E0001 to U+E007F), bidi overrides (U+202A to U+202E, U+2066 to U+2069), variation selectors 17 to 256 (Glassworm attack vector)