II.
LibraryProcess JSON
Structured · livelib-process:security-compliance--container-security
container-security json
Inspect the normalized record payload exactly as the atlas UI reads it.
{
"id": "lib-process:security-compliance--container-security",
"_kind": "LibraryProcess",
"_file": "generated-library/processes.yaml",
"_cluster": "generated-library",
"attributes": {
"displayName": "container-security",
"description": "Container Security Scanning - Comprehensive container security framework covering image scanning,\nvulnerability detection, registry security, runtime protection, policy enforcement, and compliance validation\nusing industry-leading tools like Trivy, Clair, Grype, and runtime security solutions.",
"libraryPath": "library/specializations/security-compliance/container-security.js",
"specialization": "security-compliance",
"references": [
"- NIST 800-190 Container Security: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-190.pdf\n- CIS Docker Benchmark: https://www.cisecurity.org/benchmark/docker\n- Trivy Documentation: https://aquasecurity.github.io/trivy/\n- Clair Project: https://quay.github.io/clair/\n- Grype Scanner: https://github.com/anchore/grype\n- OPA Policies: https://www.openpolicyagent.org/\n- Falco Runtime Security: https://falco.org/"
],
"example": "const result = await orchestrate('specializations/security-compliance/container-security', {\n containerImages: ['myapp:latest', 'myapi:v1.2.3', 'nginx:alpine'],\n registryUrl: 'https://registry.example.com',\n scanDepth: 'comprehensive',\n severityThreshold: 'medium',\n policyEnforcement: true,\n runtimeProtection: true,\n complianceStandards: ['CIS-Docker', 'NIST-800-190', 'PCI-DSS'],\n failOnCritical: true,\n generateSBOM: true,\n signImages: true\n});",
"usesAgents": [
"image-validator",
"grype-scanner",
"config-assessor",
"layer-analyst",
"registry-validator",
"policy-enforcer",
"compliance-validator",
"image-signer",
"runtime-protector",
"security-scorer",
"remediation-planner",
"security-reporter"
],
"usesSkills": [
"container-security-scanner",
"secret-detection-scanner"
]
},
"outgoingEdges": [
{
"from": "lib-process:security-compliance--container-security",
"to": "domain:security",
"kind": "lib_applies_to_domain",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--container-security",
"to": "topic:microservices",
"kind": "lib_covers_topic",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--container-security",
"to": "workflow:vulnerability-management",
"kind": "lib_implements_workflow",
"attributes": {
"weight": 1
}
},
{
"from": "lib-process:security-compliance--container-security",
"to": "specialization:security-compliance",
"kind": "lib_belongs_to_specialization",
"attributes": {
"weight": 0.9
}
},
{
"from": "lib-process:security-compliance--container-security",
"to": "lib-skill:security-compliance--container-security-scanner",
"kind": "uses_skill",
"attributes": {
"weight": 0.8
}
},
{
"from": "lib-process:security-compliance--container-security",
"to": "lib-skill:security-compliance--secret-detection-scanner",
"kind": "uses_skill",
"attributes": {
"weight": 0.8
}
}
],
"incomingEdges": []
}