iiRecord
Agentic AI Atlas · container-security
lib-process:security-compliance--container-securitya5c.ai
II.
LibraryProcess JSON

lib-process:security-compliance--container-security

Structured · live

container-security json

Inspect the normalized record payload exactly as the atlas UI reads it.

File · generated-library/processes.yamlCluster · generated-library
Record JSON
{
  "id": "lib-process:security-compliance--container-security",
  "_kind": "LibraryProcess",
  "_file": "generated-library/processes.yaml",
  "_cluster": "generated-library",
  "attributes": {
    "displayName": "container-security",
    "description": "Container Security Scanning - Comprehensive container security framework covering image scanning,\nvulnerability detection, registry security, runtime protection, policy enforcement, and compliance validation\nusing industry-leading tools like Trivy, Clair, Grype, and runtime security solutions.",
    "libraryPath": "library/specializations/security-compliance/container-security.js",
    "specialization": "security-compliance",
    "references": [
      "- NIST 800-190 Container Security: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-190.pdf\n- CIS Docker Benchmark: https://www.cisecurity.org/benchmark/docker\n- Trivy Documentation: https://aquasecurity.github.io/trivy/\n- Clair Project: https://quay.github.io/clair/\n- Grype Scanner: https://github.com/anchore/grype\n- OPA Policies: https://www.openpolicyagent.org/\n- Falco Runtime Security: https://falco.org/"
    ],
    "example": "const result = await orchestrate('specializations/security-compliance/container-security', {\n  containerImages: ['myapp:latest', 'myapi:v1.2.3', 'nginx:alpine'],\n  registryUrl: 'https://registry.example.com',\n  scanDepth: 'comprehensive',\n  severityThreshold: 'medium',\n  policyEnforcement: true,\n  runtimeProtection: true,\n  complianceStandards: ['CIS-Docker', 'NIST-800-190', 'PCI-DSS'],\n  failOnCritical: true,\n  generateSBOM: true,\n  signImages: true\n});",
    "usesAgents": [
      "image-validator",
      "grype-scanner",
      "config-assessor",
      "layer-analyst",
      "registry-validator",
      "policy-enforcer",
      "compliance-validator",
      "image-signer",
      "runtime-protector",
      "security-scorer",
      "remediation-planner",
      "security-reporter"
    ],
    "usesSkills": [
      "container-security-scanner",
      "secret-detection-scanner"
    ]
  },
  "outgoingEdges": [
    {
      "from": "lib-process:security-compliance--container-security",
      "to": "domain:security",
      "kind": "lib_applies_to_domain",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--container-security",
      "to": "topic:microservices",
      "kind": "lib_covers_topic",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--container-security",
      "to": "workflow:vulnerability-management",
      "kind": "lib_implements_workflow",
      "attributes": {
        "weight": 1
      }
    },
    {
      "from": "lib-process:security-compliance--container-security",
      "to": "specialization:security-compliance",
      "kind": "lib_belongs_to_specialization",
      "attributes": {
        "weight": 0.9
      }
    },
    {
      "from": "lib-process:security-compliance--container-security",
      "to": "lib-skill:security-compliance--container-security-scanner",
      "kind": "uses_skill",
      "attributes": {
        "weight": 0.8
      }
    },
    {
      "from": "lib-process:security-compliance--container-security",
      "to": "lib-skill:security-compliance--secret-detection-scanner",
      "kind": "uses_skill",
      "attributes": {
        "weight": 0.8
      }
    }
  ],
  "incomingEdges": []
}