Skip to content

Commit 3ee2a9a

Browse files
authored
docs: sharpen CI/CD and enterprise adoption paths (#1152)
## Summary - add clearer Trivy-style CI/CD quickstarts to the README - strengthen enterprise deployment guidance for GitHub Action, Docker, air-gapped, and rollout paths - align Docker Hub and MCP container description metadata with current positioning ## Validation - UV_CACHE_DIR=/tmp/agent-bom-uv-cache uv run python scripts/check_release_consistency.py
1 parent 6634bc3 commit 3ee2a9a

File tree

4 files changed

+103
-4
lines changed

4 files changed

+103
-4
lines changed

.github/workflows/publish-mcp.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ jobs:
6363
org.opencontainers.image.version=${{ steps.version.outputs.version }}
6464
org.opencontainers.image.source=https://github.com/${{ github.repository }}
6565
org.opencontainers.image.title=agent-bom
66-
org.opencontainers.image.description=Security scanner for AI infrastructure — MCP server (stdio)
66+
org.opencontainers.image.description=Open security platform for agentic infrastructure — MCP server (stdio)
6767
org.opencontainers.image.created=${{ github.event.workflow_run.created_at || github.event.repository.updated_at }}
6868
org.opencontainers.image.revision=${{ github.sha }}
6969
@@ -128,7 +128,7 @@ jobs:
128128
org.opencontainers.image.version=${{ steps.version.outputs.version }}
129129
org.opencontainers.image.source=https://github.com/${{ github.repository }}
130130
org.opencontainers.image.title=agent-bom-sse
131-
org.opencontainers.image.description=Security scanner for AI infrastructure — MCP server (streamable HTTP)
131+
org.opencontainers.image.description=Open security platform for agentic infrastructure — MCP server (streamable HTTP)
132132
org.opencontainers.image.created=${{ github.event.workflow_run.created_at || github.event.repository.updated_at }}
133133
org.opencontainers.image.revision=${{ github.sha }}
134134

.github/workflows/release.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ jobs:
135135
org.opencontainers.image.version=${{ steps.meta.outputs.version }}
136136
org.opencontainers.image.source=https://github.com/${{ github.repository }}
137137
org.opencontainers.image.title=agent-bom
138-
org.opencontainers.image.description=AI security scanner for agents, MCP, containers, cloud, and runtime
138+
org.opencontainers.image.description=Open security scanner for agentic infrastructure: agents, MCP, containers, cloud, and runtime.
139139
org.opencontainers.image.created=${{ github.event.head_commit.timestamp }}
140140
org.opencontainers.image.revision=${{ github.sha }}
141141
@@ -158,7 +158,7 @@ jobs:
158158
"https://hub.docker.com/v2/repositories/agentbom/agent-bom/" \
159159
-H "Authorization: Bearer ${TOKEN}" \
160160
-H "Content-Type: application/json" \
161-
-d "{\"full_description\": ${DESCRIPTION}, \"description\": \"AI security scanner for agents, MCP, containers, cloud, and runtime\"}"
161+
-d "{\"full_description\": ${DESCRIPTION}, \"description\": \"Open security scanner for agentic infrastructure: agents, MCP, containers, cloud, and runtime.\"}"
162162
163163
- name: Clean up old Docker Hub tags (keep last 10)
164164
env:

README.md

Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -185,6 +185,51 @@ docker run --rm agentbom/agent-bom agents # Docker
185185
| Shield SDK | `from agent_bom.shield import Shield` | In-process protection |
186186
| Dashboard | `agent-bom serve` | API + Next.js UI (20 pages) |
187187

188+
### CI/CD in 60 seconds
189+
190+
Use the GitHub Action when you want Trivy-style adoption: one step, one gate, SARIF in the Security tab, and a clean exit code for CI.
191+
192+
**Repo + MCP + instruction files**
193+
194+
```yaml
195+
- uses: msaad00/agent-bom@v0.75.12
196+
with:
197+
scan-type: scan
198+
severity-threshold: high
199+
upload-sarif: true
200+
enrich: true
201+
fail-on-kev: true
202+
```
203+
204+
**Container image gate**
205+
206+
```yaml
207+
- uses: msaad00/agent-bom@v0.75.12
208+
with:
209+
scan-type: image
210+
scan-ref: ghcr.io/acme/agent-runtime:sha-abcdef
211+
severity-threshold: critical
212+
```
213+
214+
**IaC gate**
215+
216+
```yaml
217+
- uses: msaad00/agent-bom@v0.75.12
218+
with:
219+
scan-type: iac
220+
iac: Dockerfile,k8s/,infra/main.tf
221+
severity-threshold: high
222+
```
223+
224+
**Air-gapped / pre-synced CI**
225+
226+
```yaml
227+
- uses: msaad00/agent-bom@v0.75.12
228+
with:
229+
auto-update-db: false
230+
enrich: false
231+
```
232+
188233
<details>
189234
<summary><b>GitHub Action</b></summary>
190235
@@ -200,6 +245,15 @@ docker run --rm agentbom/agent-bom agents # Docker
200245
201246
</details>
202247
248+
### Enterprise rollout
249+
250+
- `Developer endpoints`: run `agent-bom agents` locally or via MDM for workstation inventory and posture.
251+
- `CI/CD`: use the GitHub Action for PR gates, SARIF upload, image gates, and IaC checks.
252+
- `Central security team`: deploy `agent-bom serve` for fleet ingestion, posture, and audit exports.
253+
- `Air-gapped / isolated`: run the Docker image with `--offline` and `auto-update-db: false` using a pre-synced local DB.
254+
255+
See [docs/ENTERPRISE_DEPLOYMENT.md](docs/ENTERPRISE_DEPLOYMENT.md) for rollout patterns, auth models, and storage backends.
256+
203257
<details>
204258
<summary><b>Install extras</b></summary>
205259

docs/ENTERPRISE_DEPLOYMENT.md

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,8 @@ agent-bom is built on four security principles:
1717

1818
### 1. CI/CD Pipeline — scan on every PR
1919

20+
Start with the same adoption pattern teams expect from Trivy or Grype: a single CI step that fails on policy, uploads SARIF, and produces artifacts security teams can review.
21+
2022
```yaml
2123
# GitHub Actions
2224
- uses: msaad00/agent-bom@v0.75.12
@@ -32,6 +34,35 @@ agent-bom is built on four security principles:
3234
**What leaves the machine:** package names + versions only (to OSV API).
3335
**Credentials:** never accessed — scans manifest files, not environments.
3436
37+
**Common CI/CD patterns**
38+
39+
```yaml
40+
# Container image gate
41+
- uses: msaad00/agent-bom@v0.75.12
42+
with:
43+
scan-type: image
44+
scan-ref: ghcr.io/acme/agent-runtime:sha-abcdef
45+
severity-threshold: critical
46+
47+
# IaC gate
48+
- uses: msaad00/agent-bom@v0.75.12
49+
with:
50+
scan-type: iac
51+
iac: Dockerfile,k8s/,infra/main.tf
52+
severity-threshold: high
53+
54+
# Air-gapped or fully cached CI
55+
- uses: msaad00/agent-bom@v0.75.12
56+
with:
57+
auto-update-db: false
58+
enrich: false
59+
```
60+
61+
**Recommended rollout**
62+
1. Start with `severity-threshold: critical` and `upload-sarif: true`.
63+
2. Turn on `enrich: true` and `fail-on-kev: true` after the baseline is clean.
64+
3. Add `policy` or `warn-on-severity` once teams are comfortable with the signal.
65+
3566
### 2. Endpoint Fleet — MDM-pushed scan
3667

3768
For discovering MCP servers and AI agents on employee workstations:
@@ -116,6 +147,11 @@ docker run --rm \
116147

117148
Multi-arch: `linux/amd64` + `linux/arm64`. Non-root container. SHA-pinned base image.
118149

150+
**Best uses**
151+
- Isolated scans in CI where you do not want to install Python or Node.
152+
- Air-gapped environments with a pre-synced local vulnerability DB.
153+
- Reproducible image scans across developer laptops and build runners.
154+
119155
## Output Integration
120156

121157
| Target | Command | Format |
@@ -147,3 +183,12 @@ agent-bom protects its own supply chain:
147183
- **Releases:** SLSA L3 provenance attestation + Sigstore signing
148184
- **No eval/exec:** zero `eval()`, `exec()`, or `shell=True` in production code
149185
- **Self-scan:** agent-bom scans itself on every merge (post-merge-self-scan.yml)
186+
187+
## Adoption path by team
188+
189+
| Team | First rollout step | Next step |
190+
|------|--------------------|-----------|
191+
| Developers | `agent-bom agents -p .` | `agent-bom skills scan .` + local `agent-bom check` |
192+
| AppSec / security engineering | GitHub Action with SARIF | Fleet API + policy-as-code gates |
193+
| Platform / DevOps | Docker image gate + IaC scan | Air-gapped DB sync + runtime proxy |
194+
| Enterprise security | Central `agent-bom serve` | Postgres/Snowflake/ClickHouse + webhook integrations |

0 commit comments

Comments
 (0)