# Vulnerability Explorer agent guide ## Mission Vulnerability Explorer delivers policy-aware triage, investigation, and reporting surfaces for effective findings. ## Key docs - [Module README](./README.md) - [Architecture](./architecture.md) - [Implementation plan](./implementation_plan.md) - [Task board](./TASKS.md) ## How to get started 1. Review ./architecture.md for ledger schema, workflow states, and export requirements. 2. Open ../../implplan/SPRINTS.md and locate stories for this component. 3. Check ./TASKS.md and update status before/after work. 4. Read README/architecture for design context and update as the implementation evolves. ## Guardrails - Uphold Aggregation-Only Contract boundaries when consuming ingestion data. - Preserve determinism and provenance in all derived outputs. - Document offline/air-gap pathways for any new feature. - Update telemetry/observability assets alongside feature work.