Security patch PRs
Agents scan for CVEs overnight and open ready-to-merge pull requests by morning.
No pipeline YAML to hand-write. No complex scripting. Just describe the agent’s purpose in a markdown file with a YAML front-matter header for configuration.
---on: schedule: weekly on monday around 10:00engine: model: gpt-4.1tools: bash: [grep, find, wc, jq]safe-outputs: create-pull-request: title-prefix: "[docs] " max: 1 comment-on-work-item:---
## Documentation Sync
Review all public API surfaces and ensure the correspondingdocs are up to date. Open a PR with any corrections andcomment on related work items with a summary.# Auto-generated by ado-aw -- do not edittrigger: noneschedules: - cron: "23 10 * * 1" branches: include: [main]stages: - stage: Agent # Network-isolated sandbox, read-only token... - stage: Detection # AI threat scan of proposed outputs... - stage: Execution # Apply approved PRs and comments...Vulnerabilities patched. Docs updated. Broken builds diagnosed and fixed. By the time you open your laptop, agents have already done the work — proposed, reviewed, and ready to merge.
Security patch PRs
Agents scan for CVEs overnight and open ready-to-merge pull requests by morning.
Pipeline failure analysis
When a build breaks, an agent reads the logs, identifies the root cause, and proposes a fix PR.
Documentation consistency
Keep READMEs, changelogs, and API docs in sync with the code — automatically.
Work item triage
Stale issues get flagged, duplicates get linked, and priorities get suggested — every day.
Every compiled pipeline enforces a defense-in-depth model. The agent never receives write credentials or secrets.
flowchart TD
E["Trigger"] --> Agent
subgraph Sandbox["Sandbox"]
direction LR
Agent["AI Agent"]
Details["Isolated Container\nRead-only Token\nNetwork Firewall"]
end
Agent --> Output["Proposed Safe Outputs"]
Output --> Detect["Threat Detection"]
Detect -->|"safe"| Write["Executor (write token)"]
Detect -->|"blocked"| Fail["Rejected"]
Write --> ADO["Azure DevOps APIs"]
style Sandbox stroke:#7c3aed,stroke-width:2px,fill:none
style Agent fill:#4361ee,color:#fff,stroke:#3a56d4
style Details fill:none,stroke:#7c3aed,stroke-width:1px,color:#9f7aea,stroke-dasharray:4 2,font-size:0.75rem
style Detect fill:#e6a817,color:#1a1a1a,stroke:#c49000
style Write fill:#2d9d78,color:#fff,stroke:#238066
style Fail fill:#e63946,color:#fff,stroke:#c5303c
style ADO fill:#4361ee,color:#fff,stroke:#3a56d4
| Layer | What it does |
|---|---|
| Read-only token | The agent can observe your repos but cannot push, merge, or delete anything |
| Zero secrets | Write tokens, API keys, and credentials exist only in the isolated executor stage |
| Network firewall | All outbound traffic routes through an allowlist-only proxy; everything else is dropped |
| Safe outputs | The agent proposes structured actions (PRs, comments, work items); hard limits and prefixes constrain what can be requested |
| Threat detection | A dedicated AI scan checks proposals for prompt injection, secret leaks, and malicious patterns before anything is applied |
With Copilot agents
Download ado-aw, run ado-aw init, then co-create your first agent interactively with /agent ado-aw.
Write it by hand
Author an agent markdown file, compile it, push, and configure your Azure DevOps project.
Familiar with GitHub Agentic Workflows? Azure DevOps Agentic Workflows leverages the exact same technologies — network-isolated sandboxes, safe outputs, threat detection, and MCP tooling — with a specialized compiler that targets Azure DevOps Pipelines instead of GitHub Actions.
| GitHub Agentic Workflows | Azure DevOps Agentic Workflows | |
|---|---|---|
| Platform | GitHub Actions | Azure DevOps Pipelines |
| Agent format | Markdown + YAML front matter | Markdown + YAML front matter |
| Security model | Read-only token, AWF sandbox, safe outputs, threat detection | Read-only token, AWF sandbox, safe outputs, threat detection |
| Compiler | gh aw compile | ado-aw compile |
| Safe outputs | PRs, issues, labels, comments | PRs, work items, wiki pages, build tags |
| MCP support | GitHub MCP, custom servers | Azure DevOps MCP, GitHub MCP, custom servers |
If your team already writes gh-aw workflows, you already know how to write ado-aw agents. The markdown format, security architecture, and mental model are identical.
Inspired by GitHub Agentic Workflows.