Skip to content

Amazon Project Kuiper

Amazon Project Kuiper - HITL CI/CD and Secure Code Signing

Software Development Engineer internship project focused on automating hardware-in-the-loop testing for satellite software, improving reproducibility, and designing secure software-signing controls.

Amazon Project Kuiper related visual
Amazon Project Kuiper context visual.

Context

  • Role: Software Development Engineer Intern at Amazon Project Kuiper (May 2025 - Aug 2025).
  • Location: Seattle, Washington, United States (on-site).
  • Focus: software infrastructure, test automation, and supply-chain security design.

Problem

  • Manual HITL test loops slowed development and introduced avoidable execution errors.
  • Low-level diagnostics and log triage required significant manual analysis for pass/fail decisions.
  • Code-signing process needed stronger access-control and threat-model guidance for the pipeline.

Key implementation

  • Architected an end-to-end CI/CD pipeline for automated HITL testing of satellite software.
  • Developed a Python and pytest automation framework for diagnostics, log parsing, and HTML visualization.
  • Provisioned cloud infrastructure with AWS CDK and containerized execution with Docker.
  • Authored a security design proposal for automated code signing with threat models and access controls.

System design

  1. Source change triggers CI workflow for build and validation.
  2. Containerized environment provisions deterministic dependencies for test execution.
  3. HITL job orchestrator dispatches diagnostics to hardware targets and collects telemetry.
  4. Automated parsers convert raw logs into structured pass/fail signals and HTML reports.
  5. Release gate routes approved artifacts through controlled code-signing workflow.

Impact

  • Accelerated development cycles by removing manual HITL execution steps.
  • Improved repeatability across environments through infrastructure-as-code and containerized runs.
  • Reduced test-triage overhead by automating diagnostics, parsing, and report generation.
  • Strengthened software supply-chain posture with explicit security design and access controls.

Notes

Details are intentionally high-level to respect NDA constraints around internal services, tooling, and hardware.