<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Mahesh</title>
    <description>The latest articles on DEV Community by Mahesh (@mpawar006).</description>
    <link>https://dev.to/mpawar006</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3760186%2F0beb0695-a019-4888-9008-378dad253df5.jpeg</url>
      <title>DEV Community: Mahesh</title>
      <link>https://dev.to/mpawar006</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/mpawar006"/>
    <language>en</language>
    <item>
      <title>Cost-Sentry: Optimizing AWS Spend with AI-Driven FinOps Auditing</title>
      <dc:creator>Mahesh</dc:creator>
      <pubDate>Fri, 13 Feb 2026 18:04:21 +0000</pubDate>
      <link>https://dev.to/mpawar006/cost-sentry-optimizing-aws-spend-with-ai-driven-finops-auditing-358e</link>
      <guid>https://dev.to/mpawar006/cost-sentry-optimizing-aws-spend-with-ai-driven-finops-auditing-358e</guid>
      <description>&lt;p&gt;&lt;strong&gt;What I Built&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In a sprawling cloud environment, "zombie" resources specifically unattached EBS volumes are a silent drain on the budget. As a Cloud Architect, I wanted to build a tool that doesn't just manage infrastructure but optimizes its cost.&lt;/p&gt;

&lt;p&gt;I built Cost-Sentry, a FinOps agent that identifies unattached EBS volumes and calculates their financial impact. It uses the GitHub Copilot CLI as a reasoning engine to generate complex Boto3 auditing scripts, which are then used to produce immediate, actionable saving reports.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Demo&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The tool is designed for high-velocity cost audits and is now part of my public GitHub portfolio.&lt;/p&gt;

&lt;p&gt;🔗 &lt;strong&gt;GitHub Repository:&lt;/strong&gt; &lt;a href="https://github.com/mpawar006/cost-sentry" rel="noopener noreferrer"&gt;https://github.com/mpawar006/cost-sentry&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cost-Sentry in Action&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The tool scans for volumes in the available state and applies a standard rate of &lt;strong&gt;$0.10 per GB/month&lt;/strong&gt; to estimate waste.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F79xxm2szc3vctbmos9pw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F79xxm2szc3vctbmos9pw.png" alt="Cost-Sentry" width="800" height="445"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Figure 1: Cost-Sentry successfully identifying 20GB of unattached storage waste.&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Financial Impact Detected:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Total Volumes Audited: 2&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Total Wasted Capacity: 20 GB&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Potential Monthly Savings: $2.00&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;My Experience with GitHub Copilot CLI&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Building this fourth project on my local machine solidified how AI can be a force multiplier for cloud management.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Logic-Driven Prompt Engineering:&lt;/strong&gt; Unlike standard code-gen, I used a structured cost_library.json to feed specific financial archetypes into the GitHub Copilot CLI. This allowed the AI to focus on the mathematical reasoning required for cost estimation rather than just boilerplate code.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;The "Safety-First" Approach:&lt;/strong&gt; A major takeaway from this challenge was ensuring AI-driven velocity doesn't bypass safety guardrails. I engineered &lt;strong&gt;Cost-Sentry&lt;/strong&gt; as a read-only auditor, proving that AI agents can be highly impactful without needing high-risk permissions.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;FinOps Visibility:&lt;/strong&gt; The CLI allowed me to quickly prototype the logic needed to parse deeply nested AWS resource metadata and transform it into a clean, human-readable terminal table using the tabulate library.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>devchallenge</category>
      <category>githubchallenge</category>
      <category>cli</category>
      <category>githubcopilot</category>
    </item>
    <item>
      <title>Kube-Guardian: Hardening Kubernetes with AI Powered Security Auditing</title>
      <dc:creator>Mahesh</dc:creator>
      <pubDate>Thu, 12 Feb 2026 15:00:13 +0000</pubDate>
      <link>https://dev.to/mpawar006/kube-guardian-hardening-kubernetes-with-ai-powered-security-auditing-439g</link>
      <guid>https://dev.to/mpawar006/kube-guardian-hardening-kubernetes-with-ai-powered-security-auditing-439g</guid>
      <description>&lt;p&gt;&lt;strong&gt;What I Built&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In modern DevOps, velocity often comes at the cost of security. As a Cloud Architect, I’ve seen developers rely on AI to quickly generate Kubernetes YAML, only to accidentally include "risky" defaults like privileged containers or missing resource limits.&lt;/p&gt;

&lt;p&gt;I built &lt;strong&gt;Kube-Guardian&lt;/strong&gt; an agentic security framework that enforces a &lt;strong&gt;"Trust but Verify"&lt;/strong&gt; workflow. It bridges the gap between AI driven manifest generation and production-grade security standards by using the &lt;strong&gt;GitHub Copilot CLI&lt;/strong&gt; to reason through security scenarios, followed by an instant, automated Python based audit engine.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Demo&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The project is open-sourced and includes pre-defined security archetypes to test both "Secure" and "Risky" paths.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4l659vrtwfo02xe0p5ul.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4l659vrtwfo02xe0p5ul.png" alt="AI-driven hardening of an Nginx manifest" width="800" height="446"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Figure 1: AI-driven hardening of an Nginx manifest passing all 3 security gates.&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc6dgv81hjzbbsqsd5tvb.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc6dgv81hjzbbsqsd5tvb.png" alt="Kube-Guardian failing a risky Postgres deployment" width="800" height="445"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Figure 2: Kube-Guardian correctly identifying and failing a risky Postgres deployment.&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;🔗 &lt;strong&gt;GitHub Repository:&lt;/strong&gt; &lt;a href="https://github.com/mpawar006/kube-guardian" rel="noopener noreferrer"&gt;https://github.com/mpawar006/kube-guardian&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Kube-Guardian in Action&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. AI-Driven Hardening:&lt;/strong&gt;&lt;br&gt;
Using the Copilot CLI, the tool generates a hardened Nginx manifest that implements non-root execution and strict resource constraints.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Automated Security Gates:&lt;/strong&gt;&lt;br&gt;
The auditor validates every manifest against three critical production gates: &lt;strong&gt;Privileged Mode,&lt;/strong&gt; &lt;strong&gt;Resource Limits,&lt;/strong&gt; and &lt;strong&gt;Non-Root Execution.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Results:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;✅ &lt;strong&gt;Secure Path (Nginx):&lt;/strong&gt; nginx: No Privileged Mode -&amp;gt; PASSED&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;❌ &lt;strong&gt;Risky Path (Postgres):&lt;/strong&gt; postgres: No Privileged Mode -&amp;gt; FAILED&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;My Experience with GitHub Copilot CLI&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Integrating the &lt;strong&gt;GitHub Copilot CLI&lt;/strong&gt; into a Kubernetes workflow was a significant technical journey on my local machine.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Prompting as Architecture:&lt;/strong&gt; I used Copilot not just for code completion, but as a &lt;strong&gt;Reasoning Engine.&lt;/strong&gt; By passing structured scenarios from a guardian_library.json, I was able to treat the CLI as a programmatic backend for complex infrastructure decisions.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Impact on Security:&lt;/strong&gt; The CLI allowed me to quickly prototype secure configurations (like dropping capabilities and preventing privilege escalation) that would typically require searching through pages of Kubernetes documentation.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>devchallenge</category>
      <category>githubchallenge</category>
      <category>cli</category>
      <category>githubcopilot</category>
    </item>
    <item>
      <title>IAM Sentinel: Bridging AI Reasoning with AWS Security Compliance</title>
      <dc:creator>Mahesh</dc:creator>
      <pubDate>Mon, 09 Feb 2026 15:55:24 +0000</pubDate>
      <link>https://dev.to/mpawar006/iam-sentinel-bridging-ai-reasoning-with-aws-security-compliance-48bl</link>
      <guid>https://dev.to/mpawar006/iam-sentinel-bridging-ai-reasoning-with-aws-security-compliance-48bl</guid>
      <description>&lt;p&gt;&lt;strong&gt;What I Built&lt;/strong&gt;&lt;br&gt;
As a Cloud Architect, the principle of Least Privilege is my guiding star, but writing manual IAM policies is often a bottleneck that leads to "security debt." I built IAM Sentinel an AI powered agentic framework that bridges the gap between high-level architectural requirements and verified cloud security code.&lt;/p&gt;

&lt;p&gt;IAM Sentinel uses the GitHub Copilot CLI to "reason" through security scenarios and generate precise JSON policies. To ensure these policies aren't just plausible but technically sound, I integrated a validation layer using Boto3 and the AWS IAM Policy Simulator, creating a complete "Generate -&amp;gt; Validate -&amp;gt; Report" cycle for security-as-code.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Demo&lt;/strong&gt;&lt;br&gt;
The project is fully open-sourced and documented to be "cloned and run" for anyone with AWS credentials and the Copilot CLI.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Filftepb2yw335023yoyj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Filftepb2yw335023yoyj.png" alt="AI Reasoning" width="800" height="449"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Figure 1: GitHub Copilot CLI reasoning through the S3 scenario.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F43zjgevmqiqqgspjicat.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F43zjgevmqiqqgspjicat.png" alt="The Validation Proof" width="800" height="449"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Figure 2: Automated validation via Boto3 and AWS IAM Policy Simulator proving the policy is functionally correct.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgojhr1j21pjirlfvwpwt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgojhr1j21pjirlfvwpwt.png" alt="The Final Report" width="800" height="444"&gt;&lt;/a&gt;&lt;br&gt;
&lt;em&gt;Figure 3: The final generated Markdown audit report summarizing the verified permissions for stakeholders.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;🔗 &lt;strong&gt;GitHub Repository:&lt;/strong&gt; &lt;a href="https://github.com/mpawar006/iam-sentinel" rel="noopener noreferrer"&gt;https://github.com/mpawar006/iam-sentinel&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Sentinel in Action&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;The Request:&lt;/strong&gt; python iam_sentinel.py --scenario s3_read_write&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;The Logic:&lt;/strong&gt; Copilot CLI analyzes the scenario and generates a scoped policy distinguishing between bucket-level (ListBucket) and object-level (GetObject/PutObject) permissions.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;The Proof:&lt;/strong&gt; The tool automatically triggers the AWS Policy Simulator to verify the JSON.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Sample Audit Report Output:&lt;/strong&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;AWS Action&lt;/th&gt;
&lt;th&gt;Resource Target&lt;/th&gt;
&lt;th&gt;Status&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;s3:ListBucket&lt;/td&gt;
&lt;td&gt;&lt;code&gt;arn:aws:s3:::sentinel-data-storage&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;✅ ALLOWED&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;s3:GetObject&lt;/td&gt;
&lt;td&gt;&lt;code&gt;arn:aws:s3:::sentinel-data-storage/test.txt&lt;/code&gt;&lt;/td&gt;
&lt;td&gt;✅ ALLOWED&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;&lt;strong&gt;My Experience with GitHub Copilot CLI&lt;/strong&gt;&lt;br&gt;
Integrating the GitHub Copilot CLI into a Python automation suite was a masterclass in modern agentic development.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Impact on Speed:&lt;/strong&gt; I spent significantly less time looking up specific S3 Action names (was it s3:List or s3:ListBucket?). Copilot handled the "syntax heavy lifting," allowing me to focus on the architectural logic.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Prompting as Architecture:&lt;/strong&gt; I used Copilot not just for code completion, but as a Reasoning Engine. By passing structured scenarios from a policy_library.json, I was able to treat the CLI as a programmatic backend for security decisions.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Overcoming Hurdles:&lt;/strong&gt; I encountered some syntax evolutions with the -i and -p flags in the 2026 version of the CLI. Debugging these through subprocess gave me a deeper understanding of how the Copilot extension manages interactive vs. non-interactive sessions, eventually settling on a robust wrapper that ensures reliable execution.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>devchallenge</category>
      <category>githubchallenge</category>
      <category>cli</category>
      <category>githubcopilot</category>
    </item>
    <item>
      <title>Sentinel CLI: A Self-Healing AWS Monitoring Agent Powered by GitHub Copilot</title>
      <dc:creator>Mahesh</dc:creator>
      <pubDate>Sun, 08 Feb 2026 20:53:50 +0000</pubDate>
      <link>https://dev.to/mpawar006/sentinel-cli-a-self-healing-aws-monitoring-agent-powered-by-github-copilot-4128</link>
      <guid>https://dev.to/mpawar006/sentinel-cli-a-self-healing-aws-monitoring-agent-powered-by-github-copilot-4128</guid>
      <description>&lt;p&gt;What I Built&lt;br&gt;
I built Sentinel CLI, a Python-based intelligent agent designed to bridge the gap between cloud infrastructure monitoring and automated remediation. It uses boto3 to scan the us-east-1 region for stopped EC2 instances and, rather than just alerting, it utilizes the GitHub Copilot CLI to reason and suggest the exact CLI commands needed to restore the service.&lt;/p&gt;

&lt;p&gt;Demo&lt;br&gt;
GitHub Repository: &lt;a href="https://github.com/mpawar006/sentinel-cli" rel="noopener noreferrer"&gt;https://github.com/mpawar006/sentinel-cli&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8jcit5puib4mnnxl4hmo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8jcit5puib4mnnxl4hmo.png" alt=" " width="800" height="448"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsxq1l8ebjl0iqelpr1j8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsxq1l8ebjl0iqelpr1j8.png" alt=" " width="800" height="449"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsrynn6entpsbtbhs2bkc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsrynn6entpsbtbhs2bkc.png" alt=" " width="800" height="423"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvlf2zq4o7gowdb1c8wwm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvlf2zq4o7gowdb1c8wwm.png" alt=" " width="800" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;My Experience with GitHub Copilot CLI&lt;br&gt;
Building this project on my ThinkPad T490 highlighted the power of "Agentic DevOps."&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Intelligent Reasoning: I integrated my Python script directly with the Copilot CLI using subprocess. This allowed the script to pass context to the AI and receive sophisticated, production-ready AWS commands in return.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Problem Solving: During development, Copilot helped me resolve Windows-specific UTF-8 encoding issues so that my terminal alerts (🚨) and formatting looked professional and clear.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Human-in-the-Loop: The CLI's interactive nature allowed me to build a secure approval flow, ensuring that an architect always verifies a "healing" command before execution.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>devchallenge</category>
      <category>githubchallenge</category>
      <category>cli</category>
      <category>githubcopilot</category>
    </item>
  </channel>
</rss>
