Skip to content

Add Kubernetes-focused implementation skill for manifest hardening and workload security#374

Merged
nicobistolfi merged 1 commit intomainfrom
vigilante/issue-364-add-a-kubernetes-focused-vigilante-implementation-skill-for-manifest-hardening-workload-security-and-cluster-safe-changes
Apr 2, 2026
Merged

Add Kubernetes-focused implementation skill for manifest hardening and workload security#374
nicobistolfi merged 1 commit intomainfrom
vigilante/issue-364-add-a-kubernetes-focused-vigilante-implementation-skill-for-manifest-hardening-workload-security-and-cluster-safe-changes

Conversation

@nicobistolfi
Copy link
Copy Markdown
Collaborator

Summary

  • Add a dedicated Kubernetes-focused implementation skill (vigilante-issue-implementation-on-kubernetes) that teaches coding agents to make safe manifest changes following current Kubernetes application-security guidance
  • Detect Kubernetes repositories via kustomization.yaml, skaffold.yaml, Chart.yaml, and common manifest directories containing Kubernetes resource YAML
  • Inject Kubernetes security guidance into prompts covering service accounts, securityContext, RBAC, image security, network policy, and scope guardrails
  • Select the Kubernetes skill for traditional repos with Kubernetes tech stack; monorepo skills take precedence for monorepo-shaped repos

Test plan

  • Kubernetes detection tests: kustomization.yaml, skaffold.yaml, Chart.yaml, manifest directories, non-K8s YAML negative case, dual Go+K8s detection
  • Skill selection tests: K8s repo selects K8s skill, K8s+Go prefers K8s, monorepo prefers monorepo over K8s, fallback for non-K8s
  • Security guidance tests: K8s guidance present for K8s repos, absent for non-K8s, combined Go+K8s, scope-limiting instruction
  • Prompt content tests: K8s guidance and skill reference in prompts, absent for non-K8s repos
  • Full test suite passes with no regressions

Closes #364

@nicobistolfi nicobistolfi force-pushed the vigilante/issue-364-add-a-kubernetes-focused-vigilante-implementation-skill-for-manifest-hardening-workload-security-and-cluster-safe-changes branch from d1cb4ee to c52cb1c Compare April 2, 2026 00:45
…d workload security (#364)

Introduce a dedicated Kubernetes implementation skill that teaches coding
agents to make safe manifest changes following current Kubernetes
application-security guidance.

Detection: recognize Kubernetes repositories via kustomization.yaml,
skaffold.yaml, Chart.yaml, and common manifest directories (k8s/,
kubernetes/, manifests/, deploy/, base/, overlays/, helm/) containing
Kubernetes resource YAML with apiVersion/kind markers.

Skill: covers service account hygiene, pod/container securityContext,
least-privilege RBAC, image security, network policy and resource
management, and scope guardrails to avoid broadening into cluster-ops.

Security guidance: injected into prompts for Kubernetes-detected repos,
covering the same areas as the skill for inline prompt reinforcement.

Skill selection: Kubernetes skill is selected for traditional repos with
Kubernetes tech stack detected, with monorepo skills taking precedence
for monorepo-shaped repos.
@nicobistolfi nicobistolfi force-pushed the vigilante/issue-364-add-a-kubernetes-focused-vigilante-implementation-skill-for-manifest-hardening-workload-security-and-cluster-safe-changes branch from 1b43ae4 to c74e0a9 Compare April 2, 2026 03:33
@nicobistolfi nicobistolfi merged commit 8167780 into main Apr 2, 2026
1 check passed
@nicobistolfi nicobistolfi deleted the vigilante/issue-364-add-a-kubernetes-focused-vigilante-implementation-skill-for-manifest-hardening-workload-security-and-cluster-safe-changes branch April 2, 2026 03:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Add a Kubernetes-focused Vigilante implementation skill for manifest hardening, workload security, and cluster-safe changes

1 participant