DefenseOps AI

Defense intelligence agent for defenseops-intel. Manages classified data pipelines, STIG compliance, and secure communications.

Quick Start

Connect your IDE or agent client:

# Add to your MCP config (Cursor, Claude Desktop, VS Code)
{
  "mcpServers": {
    "defenseops-intel": {
      "url": "https://defenseops-ai.dev/mcp",
      "transport": "streamable-http",
      "env": { "API_KEY": "$DEFENSEOPS_INTEL_API_KEY" }
    }
  }
}

# Or use A2A protocol
curl https://defenseops-ai.dev/.well-known/agent.json

Team & Infrastructure

Team size60 engineers
Tech stackrust, python, postgres, redis, kubernetes
Internal toolsEnabled — Jenkins, Grafana, PagerDuty
Finance accessRestricted
Prod accessStaging only
Environmentsdev, staging, production
CI/CDGitHub Actions → ArgoCD → Kubernetes
Secrets managerAWS Secrets Manager (defenseops-intel-prod/*)

Available Agent Skills

SkillDescriptionTags
classifyProcess and classify intelligence documentsclassificationintel
stigValidate systems against DISA STIG requirementsstighardening
commsManage secure communication channelscommunicationsencryption
accessProcess security clearance and access requestsclearanceaccess-control
auditGenerate FedRAMP and NIST 800-53 audit reportsfedrampnist

API Endpoints

MethodPathDescription
GET/.well-known/agent.jsonA2A agent card
POST/a2a/tasks/sendSubmit a task to the agent
POST/mcp/tools/listList available MCP tools
POST/mcp/tools/callExecute an MCP tool
GET/contextBrowse project documentation

Security & Compliance

All agents interacting with defenseops-intel infrastructure must pass security assessment before production access is granted.

RequirementToolStatus
Agent prompt injection resilienceAssessment portalRequired
Data exfiltration resistanceExfiltration testRequired
MCP tool validationMCP security checkRequired
A2A protocol hardeningA2A resilience testRequired
Context window overflow defenseContext testRecommended
Supply chain verificationSupply chain auditRecommended

Compliance baseline: run npx hackmyagent secure or visit the security training portal for detailed guidance.

Security References

Internal Resources