What I Built
In modern DevOps, velocity often comes at the cost of security. As a Cloud Architect, I’ve seen developers rely on AI to quickly generate Kubernetes YAML, only to accidentally include "risky" defaults like privileged containers or missing resource limits.
I built Kube-Guardian an agentic security framework that enforces a "Trust but Verify" workflow. It bridges the gap between AI driven manifest generation and production-grade security standards by using the GitHub Copilot CLI to reason through security scenarios, followed by an instant, automated Python based audit engine.
Demo
The project is open-sourced and includes pre-defined security archetypes to test both "Secure" and "Risky" paths.
Figure 1: AI-driven hardening of an Nginx manifest passing all 3 security gates.
Figure 2: Kube-Guardian correctly identifying and failing a risky Postgres deployment.
🔗 GitHub Repository: https://github.com/mpawar006/kube-guardian
Kube-Guardian in Action
1. AI-Driven Hardening:
Using the Copilot CLI, the tool generates a hardened Nginx manifest that implements non-root execution and strict resource constraints.
2. Automated Security Gates:
The auditor validates every manifest against three critical production gates: Privileged Mode, Resource Limits, and Non-Root Execution.
Results:
✅ Secure Path (Nginx): nginx: No Privileged Mode -> PASSED
❌ Risky Path (Postgres): postgres: No Privileged Mode -> FAILED
My Experience with GitHub Copilot CLI
Integrating the GitHub Copilot CLI into a Kubernetes workflow was a significant technical journey on my local machine.
Prompting as Architecture: I used Copilot not just for code completion, but as a Reasoning Engine. By passing structured scenarios from a guardian_library.json, I was able to treat the CLI as a programmatic backend for complex infrastructure decisions.
Impact on Security: The CLI allowed me to quickly prototype secure configurations (like dropping capabilities and preventing privilege escalation) that would typically require searching through pages of Kubernetes documentation.


Top comments (0)