Claude Code

Claude Code on Cordium combines terminal-native AI-assisted development with isolated, identity-aware execution environments. Instead of giving the agent direct access to long-lived infrastructure credentials, Cordium integrates with Octelium to provide policy-controlled, secretless access to authorized Services such as Kubernetes clusters, databases, internal APIs, SSH servers, etc... allowing Claude Code to interact with real infrastructure securely without embedding sensitive tokens, passwords, private keys, or kubeconfigs inside the Workspace. All Workspace activity and infrastructure access are emitted via OpenTelemetry-native identity-based application-layer-aware visibility in real-time. Here is an example:

spec: image: registry: url: ubuntu:24.04 repository: url: https://github.com/example/backend vars: - name: PROMPT value: | Analyze security-report.txt. Fix high-confidence vulnerabilities. Re-run the security scan. Run all tests against Octelium PostgreSQL database Services in the "test" Octelium namespace. Summarize the remediations performed. runtime: autoStop: true envVars: - key: ANTHROPIC_API_KEY fromSecret: anthropic-api-key tasks: - name: install-tools type: ON_CREATE run: | apt-get update apt-get install -y \ git \ curl \ nodejs \ npm \ golang-go npm install -g @anthropic-ai/claude-code go install github.com/securego/gosec/v2/cmd/gosec@latest - name: security-scan type: POST_START run: | ~/go/bin/gosec ./... > security-report.txt onFailure: ON_FAILURE_CONTINUE - name: remediation type: POST_START run: | claude --print "${{ vars.PROMPT }}" limit: cpu: millicores: 4000 memory: megabytes: 8192 storage: megabytes: 30000