CtrlK
BlogDocsLog inGet started
Tessl Logo

pantheon-ai/azure-pipelines-toolkit

Complete azure-pipelines toolkit with generation and validation capabilities

97

Quality

97%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Advisory

Suggest reviewing before use

Overview
Quality
Evals
Security
Files

summary.jsonvalidator/evals/

{
  "scenarios": [
    {
      "id": "scenario-0",
      "capability": "Security scan: detect hardcoded credentials and container :latest tags",
      "feasible": true,
      "reason": "Agent reads pipeline YAML from task input and produces a validation report — no runtime pipeline execution required"
    },
    {
      "id": "scenario-1",
      "capability": "Syntax validation: required fields, stage/job/step hierarchy, task format",
      "feasible": true,
      "reason": "Agent inspects static YAML structure and reports schema violations — no external API calls required"
    },
    {
      "id": "scenario-2",
      "capability": "Best practices: display names, task version pinning, caching, timeouts",
      "feasible": true,
      "reason": "Agent reviews pipeline YAML for best-practice patterns and produces actionable suggestions — entirely static analysis"
    },
    {
      "id": "scenario-3",
      "capability": "YAML lint: whitespace-significant formatting issues that silently restructure pipeline blocks",
      "feasible": true,
      "reason": "Agent identifies indentation and trailing-space errors in raw YAML text — no tooling execution required"
    },
    {
      "id": "scenario-4",
      "capability": "Template validation: detecting violations in referenced template files, not only the entry point",
      "feasible": true,
      "reason": "Agent reads multiple YAML files provided inline and validates each template — no external file system access required"
    }
  ]
}

tile.json