Skip to content
| Marketplace
Sign in
Visual Studio Code>Other>Enterprise Copilot OrchestratorNew to Visual Studio Code? Get it now.
Enterprise Copilot Orchestrator

Enterprise Copilot Orchestrator

2351LABS

|
2 installs
| (0) | Free
Centralized Copilot Agent Orchestration for the SDLC by 2351Labs
Installation
Launch VS Code Quick Open (Ctrl+P), paste the following command, and press enter.
Copied to clipboard
More Info

Enterprise Copilot Orchestrator

Welcome to the Enterprise Copilot Orchestrator extension! This extension centralizes and packages a collection of custom GitHub Copilot chat participants specifically tailored for the Software Development Life Cycle (SDLC).

By installing this VSIX extension, all custom agent definitions, orchestrators, and prompt strategies are automatically registered into your VS Code workspace without needing to copy raw .agent.md files into your individual repositories.

🤖 Available Agents

This extension registers 35 specific SDLC agents directly into your Copilot Chat. These are mapped dynamically to optimized models (ranging from gpt-4o-mini for fast formatting tasks to gpt-4o for deep architectural analysis).

Key Agents include:

  • @eco-pr-review-orchestrator: Coordinates multi-agent PR reviews dynamically.
  • @eco-code-refinery: Orchestrates multi-agent pipelines using RAG, MCP tools, and DAG workflows.
  • @eco-security-auditor: Performs deep security audits and vulnerability checks on code.
  • @eco-architecture-design: Validates system design, C4 models, and architectural patterns.
  • @eco-ui-ux-specialist: Reviews frontend code for accessibility (WCAG) and responsive design.
  • @eco-database-architect: Optimizes SQL schemas, migrations, and indexing strategies.
  • @eco-code-style-enforcer: Strictly enforces project linting rules and naming conventions.
  • (See the full list of 35 agents in the Copilot Chat participant list by typing @eco-)

🚀 Getting Started

When you install this extension, VS Code will automatically open an interactive "Getting Started" Walkthrough.

You can access the full interactive documentation at any time by:

  1. Opening the Command Palette (Cmd+Shift+P / Ctrl+Shift+P)
  2. Running Enterprise Copilot Orchestrator: Open Getting Started Guide

The interactive walkthrough covers:

  • Smart Routing and Orchestration
  • Exporting Local Agents and creating Custom Proxy Agents
  • Syncing with an Enterprise Remote Registry
  • Configuring Model Overrides and Text Aliases

🔌 Model Context Protocol (MCP) Support

This extension supports the Model Context Protocol (MCP), enabling your agents to dynamically call external tools running locally or registered through an enterprise registry.

⚙️ Configuring MCP Servers

You can configure local MCP servers in your user or workspace settings (settings.json):

{
  "eco.mcpServers": {
    "sqlite-helper": {
      "command": "node",
      "args": ["/path/to/sqlite/index.js", "/path/to/db.sqlite"]
    },
    "github-tools": {
      "command": "npx",
      "args": ["-y", "@modelcontextprotocol/server-github"],
      "env": {
        "GITHUB_PERSONAL_ACCESS_TOKEN": "your-token-here"
      }
    }
  }
}

🏢 Enterprise Registry-Synced MCP Servers (Enterprise Only)

If you have a valid Enterprise License (eco.enterpriseLicenseKey), you can also load MCP configurations synced from your remote git registry (registry/mcp-servers.json). These remote-configured servers will be started automatically, giving your agents secure access to internal APIs and databases.

🔄 Automatic Workspace MCP Discovery (.vscode/mcp.json)

If you already have MCP servers configured for GitHub Copilot in your workspace (under .vscode/mcp.json), the Enterprise Copilot Orchestrator will automatically discover, start, and integrate those servers dynamically on startup. You do not need to duplicate these settings in eco.mcpServers.

🛠️ Using MCP Tools in Agents

To expose MCP tools to an agent, declare them in the agent's frontmatter section:

---
name: "Database Auditor"
tools: [sqlite-helper__query_db, sqlite-helper__schema_info, run-local]
---

Tools can be specified as:

  • Namespaced (serverName__toolName): Target a specific MCP server (recommended).

📤 Exporting MCP Configuration to VS Code Copilot

VS Code Copilot natively supports MCP servers configured in .vscode/mcp.json. You can easily export and merge your eco.mcpServers settings into .vscode/mcp.json using the built-in command:

  1. Open the Command Palette (Cmd+Shift+P on macOS or Ctrl+Shift+P on Windows/Linux).
  2. Run Enterprise Copilot Orchestrator: Export MCP Configuration to Copilot (or command eco.exportMcpToCopilot).
  3. The extension will automatically create or merge your current settings into .vscode/mcp.json, allowing Copilot to natively discover and call these tools.

🔍 Retrieval-Augmented Generation (RAG) Support

This extension features a lightweight, zero-dependency BM25-based semantic retrieval engine (RAG) that allows agents to automatically retrieve relevant context snippets from the codebase instead of loading entire files or relying solely on pre-compiled system prompts.

⚙️ Enabling RAG in Custom Agents

To enable codebase context retrieval for an agent, simply declare rag: true in the agent's frontmatter section:

---
name: "Clean Code Reviewer"
rag: true
---
You are a clean code reviewer...

When an agent with RAG enabled is invoked, the extension:

  1. Performs a token-level sliding window scan of the active workspace (partitioning files into chunks of 40 lines with a 10-line overlap).
  2. Computes the BM25 statistical relevance scores for all chunks matching terms in the user prompt.
  3. Injects the top 5 highest-scoring relevant code blocks directly into the agent's query prompt.

🏢 Enterprise Registry-Synced RAG (Enterprise Only)

By default, RAG indexes files in local workspace folders. If a valid Enterprise License (eco.enterpriseLicenseKey) is configured, RAG also indexes registry-synced assets under the remote git registry folder (globalStorageUri/registry). This allows agents to retrieve shared company standards, playbooks, guidelines, and schemas seamlessly.


⛓️ Structured Output & Multi-Agent DAG Workflows

The extension includes a Directed Acyclic Graph (DAG) workflow execution engine. This allows custom agents to coordinate complex, multi-agent operations sequentially or conditionally (e.g., Code Gen $\rightarrow$ Test Gen $\rightarrow$ Code Review $\rightarrow$ Auto-Fix) based on structured JSON decisions from preceding agents.

⚙️ Configuring Workflows in Frontmatter

To define a workflow, add a workflow block inside your custom agent's frontmatter section (in JSON format):

---
name: "Audit and Fix Pipeline"
workflow: {
  "startNode": "security-audit",
  "maxIterations": 10,
  "nodes": [
    {
      "id": "security-audit",
      "agent": "security-auditor",
      "promptTemplate": "Analyze the following code for vulnerabilities: {{userPrompt}}",
      "router": {
        "decisionField": "hasVulnerabilities",
        "routes": {
          "true": "auto-fix",
          "false": "done"
        },
        "defaultRoute": "done"
      }
    },
    {
      "id": "auto-fix",
      "agent": "developer",
      "promptTemplate": "Suggest fixes for the vulnerabilities found in this report: {{security-audit.output}}",
      "router": {
        "decisionField": "dummy",
        "routes": {},
        "defaultRoute": "done"
      }
    }
  ]
}
---
Welcome to the Audit and Fix pipeline...

🧬 Workflow Features

  • Template Interpolation: Node prompts can dynamically reference the user's initial input via {{userPrompt}} or output from previous nodes via {{nodeId.output}}.
  • Structured Routing: By declaring a router configuration, the engine extracts JSON decisions from the agent output and maps specific values to the next execution node.
  • Resilient Parsing: The execution engine extracts JSON payloads even if the LLM wraps them in markdown-fenced blocks (e.g., ```json ... ```) or conversational conversational prose.
  • Loop Protection: You can restrict max execution steps via the optional maxIterations property (defaults to 10) to guard against infinite loops.

🏢 Licensing Strategy

  • Local Workflows (Free): Any workflow configured within a local custom agent (located under .github/agents/ in your workspace) or standard built-in agent can execute free of charge.
  • Registry Workflows (Enterprise): Loading and executing workflows synced from your remote git registry (located under the global storage registry folder) is gated behind a verified Enterprise License (eco.enterpriseLicenseKey).

Available Agents

Agent Name Mention Description Targeted Models
Architecture & Design Agent @eco-architecture-design Use when checking pull requests for boundary violations, layering issues, architecture drift, coupling increases, abstraction leaks, or long-term maintainability concerns. gpt-4o, gpt-4
Auto-Debugger Agent @eco-auto-debugger Automatically triages CI/CD and test failures, proposes fixes, and runs validation commands in a Directed Acyclic Graph (DAG) workflow. gpt-4o, gpt-4
Bug Hunter Agent @eco-bug-hunter Use when checking pull requests for correctness bugs, logic regressions, null handling issues, edge-case failures, state bugs, broken control flow, or backward-compatibility risk. gpt-4o, gpt-4
CI/CD & Deployment Agent @eco-cicd-deployment Use when reviewing or designing CI pipelines, deployment workflows, release automation, rollback plans, build configuration, environment promotion, or delivery safety checks. gpt-4o, gpt-4
Central Agent Hub @eco-central-agent-hub Use when routing an engineering request to the right Copilot specialist agent for pull request review, implementation, refactoring, debugging, test generation, documentation, README work, onboarding, knowledge capture, CI or deployment, observability, cost optimization, or migration work. gpt-4o, gpt-4
Commit Message Agent @eco-commit-message Reviews staged code changes and generates a clear, conventional commit message. After committing, asks if the user wants to push the code. gpt-4o-mini, gpt-3.5-turbo, gpt-4o
Config Security Review Agent @eco-config-security-review Use when reviewing configuration files for security leaks, exposed secrets, unsafe defaults, permissive CORS, weak auth settings, risky headers, insecure environment variables, CI/CD config exposure, or deployment config drift. Best for JSON, YAML, env files, appsettings, pipelines, Docker, and infra config changes. gpt-4o, gpt-4
Context Agent @eco-context-agent Use when a review or implementation task needs repository context, architecture constraints, affected modules, coding rules, or pull request scope analysis. gpt-4o, gpt-4
Cost Optimization Agent @eco-cost-optimization Use when identifying engineering changes that reduce compute, storage, logging, network, CI, or environment cost without materially degrading reliability or user outcomes. gpt-4o, gpt-4
Debugging Agent @eco-debugging Use when diagnosing a bug, narrowing a failure surface, analyzing logs or stack traces, or finding the smallest reliable fix for broken behavior. gpt-4o, gpt-4
Dependency & Licensing Agent @eco-dependency-licensing Use when checking pull requests for dependency risk, package governance, risky version jumps, unpinned dependencies, duplicate libraries, supply chain concerns, or licensing issues. gpt-4o-mini, gpt-3.5-turbo, gpt-4o
Documentation Agent @eco-documentation Use when creating or updating technical documentation, explaining features, documenting APIs or workflows, or improving developer-facing docs aligned with the codebase. gpt-4o-mini, gpt-3.5-turbo, gpt-4o
Feature Implementer Agent @eco-feature-implementer Use when implementing a feature, adding behavior, wiring a new user flow, or making a targeted product change with tests and focused validation. gpt-4o, gpt-4
Feature Completer Agent @eco-feature-completer Orchestrates feature implementation, automated test generation, and documentation updates in a Directed Acyclic Graph (DAG) workflow. gpt-4o, gpt-4
Git Expert Agent @eco-git-expert Use when you need help resolving complex merge conflicts, understanding branching strategies, recovering lost commits, or executing advanced Git operations like rebasing. gpt-4o-mini, gpt-3.5-turbo, gpt-4o
Knowledge Base Agent @eco-knowledge-base Use when turning recurring engineering questions, tribal knowledge, scattered notes, ADRs, or docs into concise reusable internal knowledge for the team. gpt-4o-mini, gpt-3.5-turbo, gpt-4o
Migration Agent @eco-migration Use when planning or reviewing framework migrations, runtime migrations, API migrations, infrastructure transitions, repository restructuring, or phased technology replacement. gpt-4o, gpt-4
Monitoring & Observability Agent @eco-monitoring-observability Use when improving logs, metrics, traces, dashboards, alerting, health checks, or incident diagnosis workflows for a service or component. gpt-4o, gpt-4
Onboarding Agent @eco-onboarding Use when helping a new team member ramp up on the repository, understand workflows, learn the project layout, or get productive with local development and review expectations. gpt-4o-mini, gpt-3.5-turbo, gpt-4o
PR Review Orchestrator @eco-pr-review-orchestrator Use when reviewing pull requests, coordinating bug review, security review, performance and reliability review, architecture review, dependency review, test review, PR synthesis, and repository context analysis across specialist agents. gpt-4o, gpt-4
Performance & Reliability Agent @eco-performance-reliability Use when checking pull requests for latency regressions, unnecessary I/O, scalability issues, retry mistakes, timeout handling, fragility, race conditions, or operational reliability risk. gpt-4o, gpt-4
Product Requirements Analyst @eco-product-requirements Use when collaborating with Product Managers or Business Analysts to iterate on PRDs, refine business logic, define acceptance criteria, and translate business needs into technical specifications. gpt-4o, gpt-4
README Specialist Agent @eco-readme-specialist Use when creating or improving a README, project overview, setup guide, usage guide, onboarding instructions, or developer quick-start documentation. gpt-4o-mini, gpt-3.5-turbo, gpt-4o
Refactoring Agent @eco-refactoring Use when improving code structure, readability, naming, maintainability, or duplication without changing external behavior. gpt-4o, gpt-4
Release Compliance Gate @eco-release-compliance-gate Audits release branches or PRs for security, licensing compliance, and configuration issues in a Directed Acyclic Graph (DAG) workflow. gpt-4o, gpt-4
Security Auditor Agent @eco-security-auditor Use when checking pull requests for security weaknesses, auth or authz issues, secrets exposure, injection risk, unsafe configuration, sensitive logging, and exploitable defaults. gpt-4o, gpt-4
Code Refinery @eco-code-refinery Orchestrates multi-agent pipelines with codebase context (RAG) and tool execution capabilities (MCP) in a Directed Acyclic Graph (DAG) workflow. gpt-4o, gpt-4
Synthesizer Agent @eco-synthesizer Use when consolidating PR review findings, deduplicating specialist output, ranking issues by severity, and producing a concise final review summary. gpt-4o-mini, gpt-3.5-turbo, gpt-4o
Test & Coverage Agent @eco-test-coverage Use when reviewing pull requests for missing tests, weak assertions, brittle tests, coverage regressions, or the wrong test level for changed behavior. gpt-4o, gpt-4
Test Generator Agent @eco-test-generator Use when generating focused tests for changed code, adding regression tests, increasing coverage for behavior, or choosing the right test level for a feature. gpt-4o, gpt-4
  • Contact us
  • Jobs
  • Privacy
  • Manage cookies
  • Terms of use
  • Trademarks
© 2026 Microsoft