40 KiB
40 KiB
Full Features List - Stella Ops
Comprehensive catalog of every capability in the Stella Ops platform.
For quick capability cards with competitive differentiation, see
key-features.md. For tier-based availability (Free/Community/Enterprise), see04_FEATURE_MATRIX.md.
Table of Contents
- Core Platform Differentiators
- Container Image Scanning
- SBOM Capabilities
- Language Analyzers
- Vulnerability Detection
- Advisory Sources
- VEX Processing
- Reachability Analysis
- Binary Analysis
- Policy Engine
- Attestation & Signing
- Regional Cryptography
- Risk Scoring & Assessment
- Evidence Management
- Determinism & Reproducibility
- CLI Features
- Web UI Features
- Offline & Air-Gap Operations
- Deployment Options
- Authentication & Authorization
- Integrations & Notifications
- Observability & Telemetry
- Scheduling & Automation
- Version Comparison
- Database & Storage
- API Capabilities
- Support & Services
1. Core Platform Differentiators
These are the fundamental capabilities that distinguish Stella Ops from other vulnerability scanners.
1.1 Decision Capsules
- Audit-grade evidence bundles containing everything needed to reproduce and verify vulnerability decisions
- Content-addressed bundles with exact SBOM, frozen feed snapshots (with Merkle roots), policy version, lattice rules
- Evidence includes reachability proofs (static + runtime), VEX statements, binary fingerprints
- Outputs include verdicts, risk scores, remediation paths
- DSSE signatures over all components
- Six-month-later replay:
stella replay srm.yaml --assert-digest <sha>produces identical results
1.2 Deterministic Replay
- Bit-for-bit reproducible scans from frozen feeds and analyzer manifests
- Replay Manifest (SRM) captures exact analyzer inputs/outputs per layer
- Feed snapshots (NVD, KEV, EPSS, distro advisories) with content hashes
- Frozen analyzer versions and configurations
- Frozen policy rules and lattice state
- Random seeds for deterministic ordering
1.3 VEX-First Decisioning (K4 Lattice Logic)
- Belnap K4 four-valued logic (Unknown, True, False, Conflict)
- VEX as logical claims with trust weighting, not suppression files
- Conflicts are explicit state, not hidden
- Vendor + runtime + reachability merged with conflicts surfaced
- Unknown treated as first-class state with risk implications
1.4 Signed Reachability Proofs
- Three-layer validation with cryptographic binding
- Every reachability graph sealed with DSSE
- Optional edge-bundle attestations for contested paths
- Proves exploitability with exact call paths from entrypoint to vulnerable function
1.5 Sovereign Offline Operation
- Full functionality without network
- Air-gapped environments get identical results to connected
- Offline Update Kits bundle everything needed
- Epistemic parity (sealed, reproducible knowledge state)
1.6 Smart-Diff (Semantic Risk Delta)
- Diff security meaning, not CVE counts
- Compare reachability graphs, policy outcomes, and trust weights between releases
- Output like "Exploitability DECREASED by 67% despite +2 CVEs"
- Material change detection for informed decision-making
1.7 Unknowns as First-Class State
- Explicit modeling of uncertainty
- Hot/Warm/Cold/Resolved bands for uncertainty tracking
- Decay algorithms for uncertainty resolution
- Blast-radius containment
- Policy budgets ("fail if unknowns > N")
2. Container Image Scanning
2.1 Image Formats
- OCI container images
- Docker images
- Container filesystem archives
- Rootfs directories
- Layer-by-layer analysis
2.2 Scanning Modes
- Quick Mode: Fast scan for basic vulnerabilities
- Standard Mode: Balanced scan with full vulnerability detection
- Deep Mode: Comprehensive analysis with reachability and binary analysis
2.3 Base Image Detection
- Automatic base image identification
- Base image layer separation
- Inherited vs. application-added package differentiation
2.4 Layer-Aware Analysis
- Per-layer package detection
- Layer change tracking
- Delta analysis between layers
- Content-addressed layer caching
2.5 Registry Integration
- Pull images by digest (content-addressed)
- Registry authentication support
- Private registry support
- Registry mirror support for offline operation
2.6 Scan Performance
- Delta-SBOM cache for warm scans < 1 second
- Concurrent scan workers (1/3/unlimited by tier)
- Content-addressed layer caching
- Incremental analysis for unchanged layers
3. SBOM Capabilities
3.1 SBOM Formats Supported
- CycloneDX 1.7 (primary output format)
- CycloneDX 1.6 (backward compatible ingest)
- SPDX 3.0.1 (full support)
- SPDX-JSON (ingest)
- Trivy-JSON (ingest)
3.2 SBOM Generation
- Automatic SBOM generation from container images
- Package extraction from all supported ecosystems
- Dependency relationship mapping
- Component metadata extraction
- License detection
3.3 SBOM Ingestion
- Auto-format detection
- Bring-Your-Own-SBOM (BYOS) support
- Third-party SBOM import
- Validation and normalization
3.4 Delta-SBOM Engine
- Content-addressed catalog
- Layer-aware ingestion
- Rescans only fetch new layers
- Warm scans < 1 second
3.5 SBOM Diff
- Semantic SBOM comparison
- Package addition/removal detection
- Version change tracking
- License change detection
3.6 SBOM Lineage Ledger (Enterprise)
- Full versioned SBOM history
- Lineage tracking across builds
- Traversal queries via Lineage API
- Audit trail for SBOM changes
3.7 SBOM Service
- Central SBOM storage and versioning
- Content-addressed storage
- SBOM deduplication
- Retention policies
4. Language Analyzers
4.1 .NET/C# Analyzer
- NuGet package detection
- packages.config parsing
- .csproj/Directory.Build.props parsing
- .NET SDK version detection
- Framework dependency mapping
- Assembly metadata extraction
4.2 Java Analyzer
- Maven dependency resolution (pom.xml)
- Gradle build file parsing (build.gradle, build.gradle.kts)
- JAR/WAR/EAR analysis
- MANIFEST.MF parsing
- Java version detection
- Spring Boot dependency detection
4.3 Go Analyzer
- go.mod/go.sum parsing
- Go module dependency resolution
- Go version detection
- Vendor directory analysis
- Binary build info extraction
4.4 Python Analyzer
- requirements.txt parsing
- Pipfile/Pipfile.lock parsing
- pyproject.toml parsing
- setup.py analysis
- Poetry lockfile support
- Conda environment parsing
- pip freeze output parsing
4.5 Node.js Analyzer
- package.json/package-lock.json parsing
- yarn.lock parsing
- pnpm-lock.yaml parsing
- npm shrinkwrap support
- Node.js version detection
- Workspace/monorepo support
4.6 Ruby Analyzer
- Gemfile/Gemfile.lock parsing
- Ruby version detection
- Bundler version detection
- Gem specification parsing
4.7 Bun Analyzer
- bun.lockb parsing
- package.json processing
- Bun-specific dependency resolution
4.8 Deno Analyzer
- deno.json parsing
- Import map resolution
- URL-based dependency tracking
- deno.lock parsing
4.9 PHP Analyzer
- composer.json/composer.lock parsing
- PHP version detection
- Packagist dependency resolution
4.10 Rust Analyzer
- Cargo.toml/Cargo.lock parsing
- Rust edition detection
- Crates.io dependency resolution
- Build target analysis
4.11 Native Binary Analyzer
- ELF binary analysis (Linux)
- PE binary analysis (Windows)
- Mach-O binary analysis (macOS)
- Build-ID extraction
- Symbol table parsing
- Dynamic library dependency detection
5. Vulnerability Detection
5.1 CVE Matching
- CVE lookup via local database
- Package-to-CVE mapping
- Version range matching
- PURL-based matching
5.2 Vulnerability Scoring
- CVSS v4.0 display
- CVSS v3.1 support
- CVSS v2.0 legacy support
- EPSS v4 probability scoring
- Priority band classification
5.3 Exploitability Assessment
- KEV (Known Exploited Vulnerabilities) flagging
- EPSS probability integration
- Reachability-aware prioritization
- VEX status consideration
5.4 License Risk Detection (Planned)
- License identification
- License compatibility analysis
- License risk scoring
- Copyleft detection
6. Advisory Sources
6.1 Primary Sources
- NVD (National Vulnerability Database)
- GHSA (GitHub Security Advisories)
- OSV (Open Source Vulnerabilities)
- KEV (Known Exploited Vulnerabilities)
- EPSS v4 (Exploit Prediction Scoring System)
6.2 Distribution-Specific Sources
- Alpine SecDB
- Debian Security Tracker
- Ubuntu USN (Ubuntu Security Notices)
- RHEL/CentOS OVAL (Community/Enterprise)
6.3 Advisory Processing (Concelier)
- Multi-source advisory ingestion
- Advisory normalization
- Duplicate detection
- Conflict resolution
- Advisory merge engine (Enterprise)
- Custom advisory connectors (Enterprise)
6.4 Feed Management
- Automated feed updates
- Feed mirroring for offline operation
- Feed snapshot versioning
- Content-addressed feed storage
7. VEX Processing
7.1 VEX Formats Supported
- OpenVEX (primary format)
- CycloneDX VEX
- CSAF VEX (Community/Enterprise)
7.2 VEX Ingestion (Excititor)
- Multi-format VEX import
- VEX validation
- VEX normalization
- Statement extraction
7.3 VEX Consensus Engine (VexLens)
- Trust vector scoring (Precision/Coverage/Recency)
- Claim strength multipliers
- Freshness decay algorithms
- Conflict detection and penalty (K4 lattice logic)
- Multi-issuer statement aggregation
7.4 Trust Weighting
- Issuer trust scoring
- Statement freshness weighting
- Claim strength assessment
- Conflict penalty calculation
7.5 VEX Conflict Resolution
- K4 four-valued logic (Unknown/True/False/Conflict)
- Conflict surfacing (not hiding)
- Visual conflict resolution (VEX Conflict Studio UI)
- Deterministic outcome selection
7.6 VEX Hub
- VEX distribution and exchange
- Internal VEX network
- VEX statement sharing
- VEX propagation across supply chain
7.7 Issuer Directory
- Issuer trust registry
- CSAF publisher management
- Trust root configuration
- Issuer metadata storage
7.8 Trust Calibration Service (Enterprise)
- Organization-specific trust tuning
- Custom trust weightings
- Historical trust analysis
8. Reachability Analysis
8.1 Static Call Graph
- Function-level call graph construction
- Cross-module call tracking
- Entry point identification
- Path enumeration
8.2 Entrypoint Detection
- 9+ framework types supported
- HTTP endpoints
- CLI entry points
- Event handlers
- Message consumers
- Scheduled tasks
8.3 BFS Reachability
- Breadth-first path search
- Shortest path calculation
- All paths enumeration
- Path filtering
8.4 Three-Layer Reachability Proofs
- Layer 1 (Static): Call graph path from entrypoint to vulnerable function
- Layer 2 (Binary): Compiled binary contains symbol with matching offset
- Layer 3 (Runtime): eBPF probe confirms function execution
8.5 Confidence Tiers
- Confirmed: All three layers agree
- Likely: Static + binary agree; no runtime data
- Present: Package present; no reachability evidence
- Unreachable: Static analysis proves no path exists
8.6 Binary Loader Resolution (Community/Enterprise)
- ELF dynamic linking resolution
- PE import table analysis
- Mach-O load command parsing
8.7 Feature Flag/Config Gating (Community/Enterprise)
- Configuration-based path analysis
- Feature flag detection
- Conditional path evaluation
8.8 Runtime Signal Correlation (Enterprise)
- Zastava integration for runtime signals
- eBPF-based function tracing
- Actual execution path verification
8.9 Gate Detection (Enterprise)
- Authentication gate detection
- Authorization check identification
- Admin-only path detection
8.10 Path Witness Generation (Enterprise)
- Audit evidence for reachability claims
- Detailed path documentation
- Witness verification
8.11 Reachability Drift Detection
- Cross-version reachability comparison
- Path change detection
- Risk delta calculation
8.12 Reachability Mini-Map API (Enterprise)
- UI visualization data
- Compact graph representation
- Interactive exploration support
8.13 Runtime Timeline API (Enterprise)
- Temporal execution analysis
- Time-based function tracking
- Historical runtime data
9. Binary Analysis
9.1 Binary Identity Extraction
- Build-ID extraction
- SHA-256 hash computation
- Content-addressed identification
- Metadata extraction
9.2 Binary Format Parsers (Community/Enterprise)
- ELF (Linux) parser
- PE (Windows) parser
- Mach-O (macOS) parser
9.3 Build-ID Vulnerability Lookup
- Direct build-ID to CVE mapping
- Pre-computed vulnerability databases
9.4 Binary Corpus Support
- Debian/Ubuntu Corpus (all tiers)
- RPM/RHEL Corpus (Community/Enterprise)
9.5 Patch-Aware Backport Detection (Community/Enterprise)
- Distribution patch tracking
- Backported fix detection
- False positive reduction
9.6 Binary Fingerprint Generation (Enterprise)
- Function-level fingerprints
- Code similarity hashing
- Version-independent matching
9.7 Fingerprint Matching Engine (Enterprise)
- Similarity search across binaries
- Fuzzy matching for modified code
- Large-scale fingerprint database
9.8 DWARF/Symbol Analysis (Enterprise)
- Debug symbol parsing
- Source location mapping
- Type information extraction
9.9 Symbol Resolution (Symbols Module)
- Symbol table parsing
- Name demangling
- Cross-reference building
- Symbol repository
10. Policy Engine
10.1 Policy Rule Formats
- YAML Policy Rules (all tiers)
- OPA/Rego Integration (Enterprise)
- Score Policy YAML (Enterprise)
10.2 Belnap K4 Four-Valued Logic
- Unknown (no information)
- True (positive assertion)
- False (negative assertion)
- Conflict (contradictory assertions)
10.3 Security Atoms (6 Types)
- PRESENT: Package is present in artifact
- APPLIES: CVE applies to package version
- REACHABLE: Vulnerable code is reachable
- MITIGATED: Compensating controls exist
- FIXED: Vulnerability is fixed
- MISATTRIBUTED: CVE incorrectly assigned
10.4 Policy Gates
- Minimum Confidence Gate: Enforce minimum confidence threshold
- Unknowns Budget Gate (Community/Enterprise): Limit acceptable unknowns
- Source Quota Gate (Enterprise): 60% source cap enforcement
- Reachability Requirement Gate (Enterprise): Require reachability proof for criticals
- Evidence Freshness Gate: Enforce evidence age limits
- VEX Trust Gate: VEX-based policy decisions
- Drift Gate: Reachability drift enforcement
- Stability Damping Gate: Noise reduction
10.5 Disposition Selection
- ECMA-424 compliant disposition mapping
- Deterministic outcome selection
- Traceable decision paths
10.6 Exception Objects & Workflow (Enterprise)
- Time-bound exceptions
- Approval chain management
- Exception tracking
10.7 Policy Version History (Enterprise)
- Full policy change audit trail
- Policy rollback capability
- Version comparison
10.8 Configurable Scoring Profiles (Enterprise)
- Simple profile (basic scoring)
- Advanced profile (multi-factor scoring)
- Custom profile creation
11. Attestation & Signing
11.1 DSSE Envelope Signing
- Detached signature envelopes
- Canonical JSON payloads
- Multi-signature support
11.2 in-toto Statement Structure
- Statement v1 format
- Subject binding to artifacts
- Predicate flexibility
11.3 Attestation Predicates
- SBOM Predicate: SBOM content attestation
- VEX Predicate: VEX statement attestation
- Reachability Predicate (Community/Enterprise): Reachability proof attestation
- Policy Decision Predicate (Community/Enterprise): Policy outcome attestation
- Human Approval Predicate (Enterprise): Manual approval attestation
- Boundary Predicate (Enterprise): Network exposure attestation
11.4 Verdict Manifest
- Signed verdict bundles (Community/Enterprise)
- Complete decision documentation
- Replay verification support
11.5 Key Management
- Ephemeral OIDC/keyless signing
- Short-lived key support
- HSM/KMS integration
- Key rotation management (Enterprise)
11.6 SLSA Provenance (Enterprise)
- SLSA v1.0 provenance attestations
- Build provenance capture
- Supply chain attestation
11.7 Transparency Logging
- Rekor Transparency Log (Enterprise): Public attestation logging
- Cosign Integration (Enterprise): Sigstore ecosystem compatibility
- Inclusion proof storage
- Local transparency mirror for offline
12. Regional Cryptography
12.1 Default Cryptography
- Ed25519 signing (default)
- Modern elliptic curve cryptography
- High performance signing/verification
12.2 FIPS 140-2/3 Mode
- ECDSA P-256 signing
- RSA-PSS signing
- US Federal compliance
- FIPS-validated modules
12.3 eIDAS Signatures
- ETSI TS 119 312 compliance
- EU qualified electronic signatures
- European compliance
12.4 GOST/CryptoPro
- GOST R 34.10-2012 signing
- Russian Federation compliance
- CryptoPro integration
12.5 SM National Standard
- GM/T 0003.2-2012 compliance
- SM2 signing algorithm
- China compliance
12.6 Post-Quantum Cryptography
- Dilithium signing (NIST PQC)
- Falcon signing support
- Future-proof security
12.7 Crypto Plugin Architecture
- Custom HSM integration
- Pluggable crypto providers
- Multi-signature DSSE envelopes (sign with multiple profiles)
12.8 RootPack Bundles
- Pre-configured trust root packages
- Regional trust root distribution
- Offline trust root updates
13. Risk Scoring & Assessment
13.1 Score Display
- CVSS v4.0/v3.1/v2.0 display
- EPSS v4 probability display
- Composite risk scores
13.2 Priority Band Classification
- Critical/High/Medium/Low/Informational bands
- Configurable band thresholds
- Multi-factor classification
13.3 EPSS-at-Scan Immutability (Community/Enterprise)
- EPSS score captured at scan time
- Historical score preservation
- Score drift tracking
13.4 Unified Confidence Model (Community/Enterprise)
- 5-factor confidence scoring
- Source confidence weighting
- Evidence strength assessment
13.5 Entropy-Based Scoring (Enterprise)
- Information-theoretic risk assessment
- Uncertainty quantification
13.6 Gate Multipliers (Enterprise)
- Reachability-aware score adjustment
- Gate-based risk modification
13.7 Unknowns Pressure Factor (Enterprise)
- Uncertainty budget enforcement
- Unknown count impact on risk
13.8 Custom Scoring Profiles (Enterprise)
- Organization-specific scoring
- Factor weight customization
- Profile versioning
13.9 Score Explanation Arrays
- Per-finding score breakdown
- Factor contribution transparency
- Decision audit support
14. Evidence Management
14.1 Findings List
- Comprehensive finding catalog
- Filtering and sorting
- Export capabilities
14.2 Evidence Graph View
- Visual evidence relationships
- Interactive exploration
- Dependency visualization
14.3 Findings Ledger (Enterprise)
- Immutable finding history
- Audit trail for all findings
- Finding lifecycle tracking
14.4 Evidence Locker (Enterprise)
- Sealed evidence storage
- Tamper-evident packaging
- Import/export capabilities
14.5 Evidence TTL Policies (Enterprise)
- Configurable retention rules
- Automatic expiration
- Compliance-driven retention
14.6 Evidence Size Budgets (Enterprise)
- Storage governance
- Quota enforcement
- Capacity planning
14.7 Retention Tiers (Enterprise)
- Hot tier (immediate access)
- Warm tier (near-line storage)
- Cold tier (archive storage)
14.8 Privacy Controls (Enterprise)
- Sensitive data redaction
- PII handling
- Anonymization support
14.9 Audit Pack Export (Enterprise)
- Compliance bundle generation
- Regulatory export formats
- Complete evidence packaging
15. Determinism & Reproducibility
15.1 Canonical JSON Serialization
- RFC 8785 compliant serialization
- Sorted keys
- Minimal escaping
- Consistent number formatting
15.2 Content-Addressed IDs
- SHA-256 based identification
- Immutable references
- Deduplication support
15.3 Replay Manifest (SRM)
- Complete scan input capture
- Version pinning
- Configuration recording
15.4 Replay Verification
stella replayCLI command- Digest assertion
- Bit-for-bit comparison
15.5 Evidence Freshness Multipliers (Community/Enterprise)
- Age-based confidence adjustment
- Decay algorithms
- Freshness enforcement
15.6 Proof Coverage Metrics (Community/Enterprise)
- Evidence completeness measurement
- Gap identification
- Coverage reporting
15.7 Fidelity Metrics (Enterprise)
- BF (Base Fidelity): Input quality
- SF (Scan Fidelity): Detection quality
- PF (Proof Fidelity): Evidence quality
- Audit dashboard integration
15.8 FN-Drift Rate Tracking (Enterprise)
- False negative monitoring
- Quality trend analysis
- Alert thresholds
15.9 Determinism Gate CI (Enterprise)
- Automated determinism testing
- CI/CD integration
- Drift prevention
16. CLI Features
16.1 Core Commands
stella scan- Container image scanningstella sbom- SBOM generation and inspectionstella vex- VEX evaluation and generationstella advisory- Advisory managementstella policy- Policy evaluationstella replay- Deterministic replay
16.2 SBOM Commands
stella sbom generate- Generate SBOM from imagestella sbom inspect- View SBOM contentsstella sbom diff- Compare SBOMsstella sbom validate- Validate SBOM formatstella sbom convert- Convert between formats
16.3 VEX Commands
stella vex evaluate- Evaluate VEX statementsstella vex generate- Generate VEX documentsstella vex import- Import VEX from filestella vex export- Export VEX statements
16.4 Attestation Commands
stella attest sign- Sign attestationsstella attest verify(Community/Enterprise) - Verify attestationsstella attest export- Export attestations
16.5 Reachability Commands
stella reachability analyze- Run reachability analysisstella graph show- Display reachability graphstella reachability export- Export reachability data
16.6 Risk Commands
stella risk evaluate- Calculate risk scoresstella risk report- Generate risk reports
16.7 Policy Commands
stella policy evaluate- Run policy evaluationstella policy validate- Validate policy filesstella policy export- Export policy decisions
16.8 Offline Commands
stella rootpack import- Import trust root bundlesstella offline sync- Sync offline datastella offline verify- Verify offline package
16.9 Database Commands
stella db update- Update vulnerability databasestella db status- Check database statusstella db export- Export database snapshot
16.10 Export Commands
stella export sarif- Export SARIF formatstella export json- Export JSON formatstella export csv- Export CSV formatstella export audit-pack(Enterprise) - Export audit bundle
16.11 Administrative Commands (Enterprise)
stella admin- Administrative utilitiesstella symbols- Symbol resolution commandsstella notify- Notification managementstella orchestrator- Workflow control
16.12 CLI Technical Features
- Native AOT compilation
- Cross-platform support (linux-x64, linux-arm64, osx-x64, osx-arm64, win-x64)
- Machine-readable output (JSON, NDJSON)
- Exit codes for CI/CD integration
- Environment variable configuration
17. Web UI Features
17.1 Core Interface
- Dark/Light mode toggle
- Responsive design
- Locale support (Cyrillic, etc.) (Community/Enterprise)
- Keyboard shortcuts (Enterprise)
17.2 Findings View
- Findings Row Component
- Filtering and sorting
- Bulk actions
- Export capabilities
17.3 Evidence Visualization
- Evidence Drawer panel
- Proof Tab for attestations
- Evidence Graph View
- Confidence Meter
17.4 VEX Interface
- VEX Conflict Studio UI
- Claim Comparison Table (Enterprise)
- Trust Algebra Panel (Enterprise)
17.5 Reachability Visualization
- Reachability Mini-Map (Enterprise)
- Path visualization
- Call graph explorer
17.6 Policy Interface
- Policy Chips Display (Enterprise)
- Gate status visualization
- Policy decision trace
17.7 Triage Features
- Triage Canvas component
- Vulnerability triage workflow
- Status management
- Assignment capabilities
17.8 Timeline Features (Enterprise)
- Runtime Timeline view
- Historical execution data
- Temporal analysis
17.9 Administrative Features (Enterprise)
- Audit Trail UI
- Knowledge Snapshot UI (air-gap prep)
- Operator/Auditor Toggle (role separation)
- Reproduce Verdict Button
17.10 Noise Gating UI
- Delta visualization
- Gating statistics
- Noise reduction controls
18. Offline & Air-Gap Operations
18.1 Offline Update Kits (OUK)
- Complete feed bundles
- Monthly (Community) / Weekly (Enterprise) updates
- Signed packages
18.2 Knowledge Snapshots (Enterprise)
- Sealed feed exports
- Complete knowledge state capture
- Merkle root verification
18.3 Offline Signature Verification (Community/Enterprise)
- Local verification without network
- Embedded revocation lists
- Cached trust roots
18.4 Offline JWT Tokens (Enterprise)
- 90-day offline tokens
- Local token validation
- Extended offline operation
18.5 Air-Gap Bundle Manifest (Enterprise)
- Transfer package specification
- Integrity verification
- Import/export workflows
18.6 No-Egress Enforcement (Enterprise)
- Strict network isolation
- Egress policy enforcement
- Connectivity validation
18.7 Offline Components
- Mirrored vulnerability feeds
- Local transparency log mirror
- RootPack trust bundles
- Embedded revocation lists
18.8 One-Command Replay (Community/Enterprise)
stella replay srm.yamlfor offline verification- No network required for replay
- Complete evidence bundle
19. Deployment Options
19.1 Docker Compose
- Single-node deployment (all tiers)
- Development environment setup
- Quick start configuration
19.2 Helm Chart (Community/Enterprise)
- Kubernetes deployment
- Configurable replicas
- Resource management
- Secret management
19.3 High Availability (Enterprise)
- Multi-replica deployment
- Load balancing
- Failover support
- Disaster recovery
19.4 Horizontal Scaling (Enterprise)
- Auto-scaling support
- Workload distribution
- Resource optimization
19.5 Dedicated Capacity (Enterprise)
- Reserved resources
- Guaranteed performance
- Isolation options
19.6 Infrastructure Requirements
- PostgreSQL 16+: Primary database
- Valkey 8.0+: Caching and queuing
- RustFS (S3) (Community/Enterprise): Object storage
19.7 Container Images
- Multi-architecture support (amd64, arm64)
- Minimal base images
- Regular security updates
20. Authentication & Authorization
20.1 Authentication Methods
- Basic Auth: Username/password (all tiers)
- API Keys: Token-based access (all tiers)
- SSO/SAML: Okta, Azure AD integration (all tiers)
- OIDC Support: OpenID Connect with discovery (all tiers)
20.2 OAuth 2.0 Grant Types
- Client Credentials: Service-to-service authentication
- Resource Owner Password Credentials: User login
- Authorization Code + PKCE: Browser-based UI flows
- Device Code: CLI login on headless agents
- Refresh Token Grant: DPoP-bound or mTLS constrained
20.3 Sender-Constraint Technologies
DPoP (Demonstration of Proof-of-Possession)
- Proof JWT on every HTTP request
- Token bound via
cnf.jkt(JWK thumbprint) - Replay prevention with JTI cache
- Nonce support for high-value services
mTLS (Mutual TLS Binding)
- Client certificate-bound tokens
- Token carries
cnf.x5t#S256(cert thumbprint) - Enforced for high-value audiences (Signer, Attestor)
- Certificate chain validation
20.4 Token Management
- Access Token (OpTok): 120-300 second TTL
- Refresh Tokens: Optional, short-lived (≤ 8h), rotating
- Token refresh (12h Free / 30d Community / Annual Enterprise)
- Short-lived key support
- JWT format with custom claims
20.5 Identity Provider Plugins
- Standard Plugin: Local username/password, MFA support
- LDAP Plugin: Active Directory / OpenLDAP integration
- OIDC Plugin: External OIDC provider federation
- SAML Plugin: SAML 2.0 assertion processing
20.6 RBAC (Role-Based Access Control)
- Basic RBAC: User/Admin roles (all tiers)
- Advanced RBAC (Enterprise): Team-based scopes, custom roles
- 70+ granular permission scopes
- Scope-based authorization enforcement
20.7 Scope Categories
- Authority Admin:
authority:tenants.*,authority:users.*,authority:roles.* - Scanner:
scanner:read,scanner:scan,scanner:export - Signer:
signer:read,signer:sign,signer:rotate - Policy:
policy:write,policy:review,policy:approve,policy:publish - VulnExplorer:
vuln:view,vuln:investigate,vuln:operate - VEX:
vex:read,vex:ingest - Graph:
graph:read,graph:write,graph:export - Evidence:
evidence:create,evidence:read,evidence:hold - Attestation:
attest:read,attest:create,attest:admin - Observability:
obs:read,obs:incident,timeline:read
20.8 ABAC (Attribute-Based Access Control)
- Environment attribute filtering (
stellaops:attr:env) - Ownership visibility (
stellaops:attr:owner) - Business tier filtering (
stellaops:attr:business_tier)
20.9 Multi-Tenant Management (Enterprise)
- Organization hierarchy
- Tenant isolation via
tidclaim - Installation isolation via
instclaim - Cross-tenant policy enforcement
20.10 Specialized Tokens
- Incident Mode Tokens: 5-minute freshness, requires human reason
- Vulnerability Workflow Tokens: Anti-forgery for mutations
- Attachment Access Tokens: Evidence bundle downloads
- Acknowledgment Tokens: Notification workflows
20.11 Security Features
- Password lockout with configurable attempts
- Key rotation (30-90 day cadence, zero-downtime)
- KMS/HSM support (private keys never leave)
- Rate limiting (per-client, per-IP, per-endpoint)
- PKCE required for Authorization Code flow
20.12 Audit Logging (Enterprise)
- Token issuance audit (sub, aud, scopes, tid, jti)
- Revocation events
- Admin changes (client/user/role)
- Credential attempt tracking with failure codes
- DPoP/mTLS validation events
- SIEM integration
- User activity tracking
21. Integrations & Notifications
21.1 Notification Channels
- In-App Notifications (all tiers)
- Email Notifications (Community/Enterprise)
- Slack Integration (all tiers)
- Microsoft Teams Integration (all tiers)
21.2 Alert Types
- New vulnerability alerts
- EPSS change alerts (Community/Enterprise)
- Policy violation alerts
- Scan completion notifications
21.3 Registry Integration
- Zastava Registry Hooks: Auto-scan on container push (all tiers)
- Registry webhook observer
- Event-driven scanning
21.4 CI/CD Integration (Enterprise)
- GitLab CI/CD gates
- GitHub Actions integration
- Jenkins plugin
- Custom webhook endpoints
21.5 Custom Webhooks (Enterprise)
- Configurable endpoints
- Event filtering
- Payload customization
21.6 Enterprise Connectors (Enterprise)
- Grid/Premium API access
- Custom connector development
- Third-party integration support
21.7 Gateway & Router
- API gateway with routing
- Transport abstraction (TCP/TLS/UDP/RabbitMQ/Valkey)
- Rate limiting
- Request routing
22. Observability & Telemetry
22.1 Metrics
- Basic metrics (all tiers)
- Scan performance metrics
- Resource utilization metrics
- Error rate tracking
22.2 OpenTelemetry (Enterprise)
- Full distributed tracing
- Trace context propagation
- Custom span attributes
22.3 Prometheus Export (Enterprise)
- Prometheus metric format
- Custom metrics endpoints
- Grafana dashboard support
22.4 Telemetry Options
- Opt-in telemetry (all tiers)
- Telemetry configuration
- Privacy controls
22.5 Quality KPIs Dashboard (Enterprise)
- Triage metrics
- Detection accuracy
- Coverage statistics
22.6 SLA Monitoring (Enterprise)
- Uptime tracking
- Performance monitoring
- SLA compliance reporting
22.7 Logging
- Structured logging
- Log levels configuration
- Log aggregation support
23. Scheduling & Automation
23.1 Manual Scans
- On-demand scanning (all tiers)
- CLI-triggered scans
- UI-initiated scans
23.2 Scheduled Scans (Enterprise)
- Cron-based scheduling
- Recurring scan configuration
- Schedule management
23.3 Event-Driven Scanning (Enterprise)
- Registry push triggers
- Webhook-initiated scans
- Pipeline integration
23.4 Task Pack Orchestration (Enterprise)
- Declarative workflow definition
- Task pack execution
- Plan-hash binding
- Approval gates
- Sealed mode for air-gap
23.5 EPSS Daily Refresh (Enterprise)
- Automatic EPSS updates
- Score recalculation
- Delta notifications
23.6 Scheduler Features
- Job queue management
- Priority scheduling
- Resource allocation
- Failure retry policies
23.7 Orchestrator Features
- Workflow coordination
- Task dependency management
- Parallel execution
- Status tracking
24. Version Comparison
24.1 Package Version Formats
- RPM (NEVRA): Name-Epoch-Version-Release-Architecture
- Debian (EVR): Epoch-Version-Release
- Alpine (APK): Alpine package versioning
- SemVer: Semantic versioning (major.minor.patch)
24.2 PURL Resolution
- Package URL parsing
- Ecosystem-aware resolution
- Version normalization
24.3 Version Range Matching
- Affected version range detection
- Fixed version identification
- Upgrade path calculation
25. Database & Storage
25.1 PostgreSQL Features
- PostgreSQL 16+ support
- Per-module schema isolation
- Row-Level Security (RLS) for multi-tenancy
- Connection pooling
25.2 Valkey/Redis Features
- Valkey 8.0+ support
- Caching layer
- Job queue backend
- Session storage
25.3 Object Storage (RustFS/S3)
- S3-compatible storage (Community/Enterprise)
- Content-addressed blob storage
- SBOM/evidence storage
- Artifact storage
25.4 Storage Features
- Content deduplication
- Compression support
- Encryption at rest
- Retention policies
26. API Capabilities
26.1 REST API
- RESTful endpoints
- OpenAPI 3.0 specification
- JSON request/response
- Pagination support
26.2 API Features
- Rate limiting (all tiers)
- 429 Backpressure handling
- Retry-After headers
- Priority queue (Enterprise)
- Burst allowance (Enterprise)
26.3 Quota Management
- Usage API (
/quota) - Scan quota tracking
- Quota enforcement
- Custom quotas (Enterprise)
26.4 API Authentication
- API key authentication
- JWT bearer tokens
- OAuth 2.0 support
- DPoP support
27. Support & Services
27.1 Documentation
- Comprehensive documentation (all tiers)
- API reference
- Architecture guides
- Tutorials and guides
27.2 Community Support
- Community forums (all tiers)
- GitHub Issues (all tiers)
- Documentation wiki
27.3 Email Support (Enterprise)
- Business hours support
- Ticket-based support
27.4 Priority Support (Enterprise)
- 4-hour response time
- Priority ticket handling
27.5 24/7 Critical Support (Enterprise)
- Round-the-clock support (add-on)
- Emergency response
27.6 Dedicated CSM (Enterprise)
- Named customer success manager
- Regular check-ins
- Account management
27.7 Professional Services (Enterprise)
- Implementation assistance
- Custom development
- Architecture review
27.8 Training & Certification (Enterprise)
- Team enablement
- Certification programs
- Custom training
27.9 SLA Guarantee (Enterprise)
- 99.9% uptime guarantee
- SLA credits
- Performance guarantees
Appendix A: Module Reference
| Module | Description |
|---|---|
| Authority | Authentication, authorization, OAuth/OIDC, DPoP |
| Gateway | API gateway with routing and transport abstraction |
| Router | Transport-agnostic messaging |
| Concelier | Vulnerability advisory ingestion and merge engine |
| Excititor | VEX document ingestion and export |
| VexLens | VEX consensus computation across issuers |
| VexHub | VEX distribution and exchange hub |
| IssuerDirectory | Issuer trust registry |
| Feedser | Evidence collection for backport detection |
| Mirror | Vulnerability feed mirror and distribution |
| Scanner | Container scanning with SBOM generation |
| BinaryIndex | Binary identity extraction and fingerprinting |
| AdvisoryAI | AI-assisted advisory analysis |
| ReachGraph | Reachability graph service |
| Symbols | Symbol resolution and debug information |
| Attestor | in-toto/DSSE attestation generation |
| Signer | Cryptographic signing operations |
| SbomService | SBOM storage, versioning, and lineage ledger |
| EvidenceLocker | Sealed evidence storage and export |
| ExportCenter | Batch export and report generation |
| Provenance | SLSA/DSSE attestation tooling |
| Policy | Policy engine with K4 lattice logic |
| RiskEngine | Risk scoring runtime |
| VulnExplorer | Vulnerability exploration and triage UI backend |
| Unknowns | Unknown component and symbol tracking |
| Scheduler | Job scheduling and queue management |
| Orchestrator | Workflow orchestration and task coordination |
| TaskRunner | Task pack execution engine |
| Notify | Notification toolkit |
| Notifier | Notifications Studio host |
| PacksRegistry | Task packs registry and distribution |
| TimelineIndexer | Timeline event indexing |
| Replay | Deterministic replay engine |
| CLI | Command-line interface |
| Zastava | Container registry webhook observer |
| Web | Angular frontend SPA |
| Cryptography | Crypto plugins (FIPS, eIDAS, GOST, SM, PQ) |
| Telemetry | OpenTelemetry traces, metrics, logging |
| Graph | Call graph and reachability data structures |
| Signals | Runtime signal collection and correlation |
| AirGap | Air-gapped deployment support |
| AOC | Append-Only Contract enforcement |
Appendix B: Supported Standards
| Standard | Version | Usage |
|---|---|---|
| CycloneDX | 1.7 | Primary SBOM format |
| SPDX | 3.0.1 | SBOM format |
| in-toto | Statement v1 | Attestation format |
| DSSE | v1 | Envelope signing |
| OpenVEX | Current spec | VEX format |
| SARIF | 2.1.0 | Findings interchange |
| Sigstore Rekor | API stable | Transparency logging |
| SLSA | v1.0 | Provenance attestation |
Appendix C: Glossary
| Term | Definition |
|---|---|
| SBOM | Software Bill of Materials - component inventory |
| VEX | Vulnerability Exploitability eXchange - exploitability status |
| DSSE | Dead Simple Signing Envelope - detached signatures |
| in-toto | Software supply chain attestation framework |
| K4 Lattice | Belnap four-valued logic (Unknown, True, False, Conflict) |
| SRM | Scan Replay Manifest - deterministic replay bundle |
| PURL | Package URL - universal package identifier |
| NEVRA | Name-Epoch-Version-Release-Architecture (RPM) |
| EVR | Epoch-Version-Release (Debian) |
| KEV | Known Exploited Vulnerabilities |
| EPSS | Exploit Prediction Scoring System |
| OVAL | Open Vulnerability and Assessment Language |
Last updated: 4 Jan 2026
For tier availability, see 04_FEATURE_MATRIX.md