1642 lines
40 KiB
Markdown
1642 lines
40 KiB
Markdown
# Full Features List - Stella Ops
|
|
|
|
> **Comprehensive catalog of every capability in the Stella Ops platform.**
|
|
>
|
|
> For quick capability cards with competitive differentiation, see [`key-features.md`](key-features.md).
|
|
> For tier-based availability (Free/Community/Enterprise), see [`04_FEATURE_MATRIX.md`](04_FEATURE_MATRIX.md).
|
|
|
|
---
|
|
|
|
## Table of Contents
|
|
|
|
1. [Core Platform Differentiators](#1-core-platform-differentiators)
|
|
2. [Container Image Scanning](#2-container-image-scanning)
|
|
3. [SBOM Capabilities](#3-sbom-capabilities)
|
|
4. [Language Analyzers](#4-language-analyzers)
|
|
5. [Vulnerability Detection](#5-vulnerability-detection)
|
|
6. [Advisory Sources](#6-advisory-sources)
|
|
7. [VEX Processing](#7-vex-processing)
|
|
8. [Reachability Analysis](#8-reachability-analysis)
|
|
9. [Binary Analysis](#9-binary-analysis)
|
|
10. [Policy Engine](#10-policy-engine)
|
|
11. [Attestation & Signing](#11-attestation--signing)
|
|
12. [Regional Cryptography](#12-regional-cryptography)
|
|
13. [Risk Scoring & Assessment](#13-risk-scoring--assessment)
|
|
14. [Evidence Management](#14-evidence-management)
|
|
15. [Determinism & Reproducibility](#15-determinism--reproducibility)
|
|
16. [CLI Features](#16-cli-features)
|
|
17. [Web UI Features](#17-web-ui-features)
|
|
18. [Offline & Air-Gap Operations](#18-offline--air-gap-operations)
|
|
19. [Deployment Options](#19-deployment-options)
|
|
20. [Authentication & Authorization](#20-authentication--authorization)
|
|
21. [Integrations & Notifications](#21-integrations--notifications)
|
|
22. [Observability & Telemetry](#22-observability--telemetry)
|
|
23. [Scheduling & Automation](#23-scheduling--automation)
|
|
24. [Version Comparison](#24-version-comparison)
|
|
25. [Database & Storage](#25-database--storage)
|
|
26. [API Capabilities](#26-api-capabilities)
|
|
27. [Support & Services](#27-support--services)
|
|
|
|
---
|
|
|
|
## 1. Core Platform Differentiators
|
|
|
|
These are the fundamental capabilities that distinguish Stella Ops from other vulnerability scanners.
|
|
|
|
### 1.1 Decision Capsules
|
|
|
|
- **Audit-grade evidence bundles** containing everything needed to reproduce and verify vulnerability decisions
|
|
- Content-addressed bundles with exact SBOM, frozen feed snapshots (with Merkle roots), policy version, lattice rules
|
|
- Evidence includes reachability proofs (static + runtime), VEX statements, binary fingerprints
|
|
- Outputs include verdicts, risk scores, remediation paths
|
|
- DSSE signatures over all components
|
|
- Six-month-later replay: `stella replay srm.yaml --assert-digest <sha>` produces identical results
|
|
|
|
### 1.2 Deterministic Replay
|
|
|
|
- **Bit-for-bit reproducible scans** from frozen feeds and analyzer manifests
|
|
- Replay Manifest (SRM) captures exact analyzer inputs/outputs per layer
|
|
- Feed snapshots (NVD, KEV, EPSS, distro advisories) with content hashes
|
|
- Frozen analyzer versions and configurations
|
|
- Frozen policy rules and lattice state
|
|
- Random seeds for deterministic ordering
|
|
|
|
### 1.3 VEX-First Decisioning (K4 Lattice Logic)
|
|
|
|
- **Belnap K4 four-valued logic** (Unknown, True, False, Conflict)
|
|
- VEX as logical claims with trust weighting, not suppression files
|
|
- Conflicts are explicit state, not hidden
|
|
- Vendor + runtime + reachability merged with conflicts surfaced
|
|
- Unknown treated as first-class state with risk implications
|
|
|
|
### 1.4 Signed Reachability Proofs
|
|
|
|
- **Three-layer validation** with cryptographic binding
|
|
- Every reachability graph sealed with DSSE
|
|
- Optional edge-bundle attestations for contested paths
|
|
- Proves exploitability with exact call paths from entrypoint to vulnerable function
|
|
|
|
### 1.5 Sovereign Offline Operation
|
|
|
|
- **Full functionality without network**
|
|
- Air-gapped environments get identical results to connected
|
|
- Offline Update Kits bundle everything needed
|
|
- Epistemic parity (sealed, reproducible knowledge state)
|
|
|
|
### 1.6 Smart-Diff (Semantic Risk Delta)
|
|
|
|
- **Diff security meaning, not CVE counts**
|
|
- Compare reachability graphs, policy outcomes, and trust weights between releases
|
|
- Output like "Exploitability DECREASED by 67% despite +2 CVEs"
|
|
- Material change detection for informed decision-making
|
|
|
|
### 1.7 Unknowns as First-Class State
|
|
|
|
- **Explicit modeling of uncertainty**
|
|
- Hot/Warm/Cold/Resolved bands for uncertainty tracking
|
|
- Decay algorithms for uncertainty resolution
|
|
- Blast-radius containment
|
|
- Policy budgets ("fail if unknowns > N")
|
|
|
|
---
|
|
|
|
## 2. Container Image Scanning
|
|
|
|
### 2.1 Image Formats
|
|
|
|
- OCI container images
|
|
- Docker images
|
|
- Container filesystem archives
|
|
- Rootfs directories
|
|
- Layer-by-layer analysis
|
|
|
|
### 2.2 Scanning Modes
|
|
|
|
- **Quick Mode**: Fast scan for basic vulnerabilities
|
|
- **Standard Mode**: Balanced scan with full vulnerability detection
|
|
- **Deep Mode**: Comprehensive analysis with reachability and binary analysis
|
|
|
|
### 2.3 Base Image Detection
|
|
|
|
- Automatic base image identification
|
|
- Base image layer separation
|
|
- Inherited vs. application-added package differentiation
|
|
|
|
### 2.4 Layer-Aware Analysis
|
|
|
|
- Per-layer package detection
|
|
- Layer change tracking
|
|
- Delta analysis between layers
|
|
- Content-addressed layer caching
|
|
|
|
### 2.5 Registry Integration
|
|
|
|
- Pull images by digest (content-addressed)
|
|
- Registry authentication support
|
|
- Private registry support
|
|
- Registry mirror support for offline operation
|
|
|
|
### 2.6 Scan Performance
|
|
|
|
- Delta-SBOM cache for warm scans < 1 second
|
|
- Concurrent scan workers (1/3/unlimited by tier)
|
|
- Content-addressed layer caching
|
|
- Incremental analysis for unchanged layers
|
|
|
|
---
|
|
|
|
## 3. SBOM Capabilities
|
|
|
|
### 3.1 SBOM Formats Supported
|
|
|
|
- **CycloneDX 1.7** (primary output format)
|
|
- **CycloneDX 1.6** (backward compatible ingest)
|
|
- **SPDX 3.0.1** (full support)
|
|
- **SPDX-JSON** (ingest)
|
|
- **Trivy-JSON** (ingest)
|
|
|
|
### 3.2 SBOM Generation
|
|
|
|
- Automatic SBOM generation from container images
|
|
- Package extraction from all supported ecosystems
|
|
- Dependency relationship mapping
|
|
- Component metadata extraction
|
|
- License detection
|
|
|
|
### 3.3 SBOM Ingestion
|
|
|
|
- Auto-format detection
|
|
- Bring-Your-Own-SBOM (BYOS) support
|
|
- Third-party SBOM import
|
|
- Validation and normalization
|
|
|
|
### 3.4 Delta-SBOM Engine
|
|
|
|
- Content-addressed catalog
|
|
- Layer-aware ingestion
|
|
- Rescans only fetch new layers
|
|
- Warm scans < 1 second
|
|
|
|
### 3.5 SBOM Diff
|
|
|
|
- Semantic SBOM comparison
|
|
- Package addition/removal detection
|
|
- Version change tracking
|
|
- License change detection
|
|
|
|
### 3.6 SBOM Lineage Ledger (Enterprise)
|
|
|
|
- Full versioned SBOM history
|
|
- Lineage tracking across builds
|
|
- Traversal queries via Lineage API
|
|
- Audit trail for SBOM changes
|
|
|
|
### 3.7 SBOM Service
|
|
|
|
- Central SBOM storage and versioning
|
|
- Content-addressed storage
|
|
- SBOM deduplication
|
|
- Retention policies
|
|
|
|
---
|
|
|
|
## 4. Language Analyzers
|
|
|
|
### 4.1 .NET/C# Analyzer
|
|
|
|
- NuGet package detection
|
|
- packages.config parsing
|
|
- .csproj/Directory.Build.props parsing
|
|
- .NET SDK version detection
|
|
- Framework dependency mapping
|
|
- Assembly metadata extraction
|
|
|
|
### 4.2 Java Analyzer
|
|
|
|
- Maven dependency resolution (pom.xml)
|
|
- Gradle build file parsing (build.gradle, build.gradle.kts)
|
|
- JAR/WAR/EAR analysis
|
|
- MANIFEST.MF parsing
|
|
- Java version detection
|
|
- Spring Boot dependency detection
|
|
|
|
### 4.3 Go Analyzer
|
|
|
|
- go.mod/go.sum parsing
|
|
- Go module dependency resolution
|
|
- Go version detection
|
|
- Vendor directory analysis
|
|
- Binary build info extraction
|
|
|
|
### 4.4 Python Analyzer
|
|
|
|
- requirements.txt parsing
|
|
- Pipfile/Pipfile.lock parsing
|
|
- pyproject.toml parsing
|
|
- setup.py analysis
|
|
- Poetry lockfile support
|
|
- Conda environment parsing
|
|
- pip freeze output parsing
|
|
|
|
### 4.5 Node.js Analyzer
|
|
|
|
- package.json/package-lock.json parsing
|
|
- yarn.lock parsing
|
|
- pnpm-lock.yaml parsing
|
|
- npm shrinkwrap support
|
|
- Node.js version detection
|
|
- Workspace/monorepo support
|
|
|
|
### 4.6 Ruby Analyzer
|
|
|
|
- Gemfile/Gemfile.lock parsing
|
|
- Ruby version detection
|
|
- Bundler version detection
|
|
- Gem specification parsing
|
|
|
|
### 4.7 Bun Analyzer
|
|
|
|
- bun.lockb parsing
|
|
- package.json processing
|
|
- Bun-specific dependency resolution
|
|
|
|
### 4.8 Deno Analyzer
|
|
|
|
- deno.json parsing
|
|
- Import map resolution
|
|
- URL-based dependency tracking
|
|
- deno.lock parsing
|
|
|
|
### 4.9 PHP Analyzer
|
|
|
|
- composer.json/composer.lock parsing
|
|
- PHP version detection
|
|
- Packagist dependency resolution
|
|
|
|
### 4.10 Rust Analyzer
|
|
|
|
- Cargo.toml/Cargo.lock parsing
|
|
- Rust edition detection
|
|
- Crates.io dependency resolution
|
|
- Build target analysis
|
|
|
|
### 4.11 Native Binary Analyzer
|
|
|
|
- ELF binary analysis (Linux)
|
|
- PE binary analysis (Windows)
|
|
- Mach-O binary analysis (macOS)
|
|
- Build-ID extraction
|
|
- Symbol table parsing
|
|
- Dynamic library dependency detection
|
|
|
|
---
|
|
|
|
## 5. Vulnerability Detection
|
|
|
|
### 5.1 CVE Matching
|
|
|
|
- CVE lookup via local database
|
|
- Package-to-CVE mapping
|
|
- Version range matching
|
|
- PURL-based matching
|
|
|
|
### 5.2 Vulnerability Scoring
|
|
|
|
- CVSS v4.0 display
|
|
- CVSS v3.1 support
|
|
- CVSS v2.0 legacy support
|
|
- EPSS v4 probability scoring
|
|
- Priority band classification
|
|
|
|
### 5.3 Exploitability Assessment
|
|
|
|
- KEV (Known Exploited Vulnerabilities) flagging
|
|
- EPSS probability integration
|
|
- Reachability-aware prioritization
|
|
- VEX status consideration
|
|
|
|
### 5.4 License Risk Detection (Planned)
|
|
|
|
- License identification
|
|
- License compatibility analysis
|
|
- License risk scoring
|
|
- Copyleft detection
|
|
|
|
---
|
|
|
|
## 6. Advisory Sources
|
|
|
|
### 6.1 Primary Sources
|
|
|
|
- **NVD** (National Vulnerability Database)
|
|
- **GHSA** (GitHub Security Advisories)
|
|
- **OSV** (Open Source Vulnerabilities)
|
|
- **KEV** (Known Exploited Vulnerabilities)
|
|
- **EPSS v4** (Exploit Prediction Scoring System)
|
|
|
|
### 6.2 Distribution-Specific Sources
|
|
|
|
- **Alpine SecDB**
|
|
- **Debian Security Tracker**
|
|
- **Ubuntu USN** (Ubuntu Security Notices)
|
|
- **RHEL/CentOS OVAL** (Community/Enterprise)
|
|
|
|
### 6.3 Advisory Processing (Concelier)
|
|
|
|
- Multi-source advisory ingestion
|
|
- Advisory normalization
|
|
- Duplicate detection
|
|
- Conflict resolution
|
|
- Advisory merge engine (Enterprise)
|
|
- Custom advisory connectors (Enterprise)
|
|
|
|
### 6.4 Feed Management
|
|
|
|
- Automated feed updates
|
|
- Feed mirroring for offline operation
|
|
- Feed snapshot versioning
|
|
- Content-addressed feed storage
|
|
|
|
---
|
|
|
|
## 7. VEX Processing
|
|
|
|
### 7.1 VEX Formats Supported
|
|
|
|
- **OpenVEX** (primary format)
|
|
- **CycloneDX VEX**
|
|
- **CSAF VEX** (Community/Enterprise)
|
|
|
|
### 7.2 VEX Ingestion (Excititor)
|
|
|
|
- Multi-format VEX import
|
|
- VEX validation
|
|
- VEX normalization
|
|
- Statement extraction
|
|
|
|
### 7.3 VEX Consensus Engine (VexLens)
|
|
|
|
- Trust vector scoring (Precision/Coverage/Recency)
|
|
- Claim strength multipliers
|
|
- Freshness decay algorithms
|
|
- Conflict detection and penalty (K4 lattice logic)
|
|
- Multi-issuer statement aggregation
|
|
|
|
### 7.4 Trust Weighting
|
|
|
|
- Issuer trust scoring
|
|
- Statement freshness weighting
|
|
- Claim strength assessment
|
|
- Conflict penalty calculation
|
|
|
|
### 7.5 VEX Conflict Resolution
|
|
|
|
- K4 four-valued logic (Unknown/True/False/Conflict)
|
|
- Conflict surfacing (not hiding)
|
|
- Visual conflict resolution (VEX Conflict Studio UI)
|
|
- Deterministic outcome selection
|
|
|
|
### 7.6 VEX Hub
|
|
|
|
- VEX distribution and exchange
|
|
- Internal VEX network
|
|
- VEX statement sharing
|
|
- VEX propagation across supply chain
|
|
|
|
### 7.7 Issuer Directory
|
|
|
|
- Issuer trust registry
|
|
- CSAF publisher management
|
|
- Trust root configuration
|
|
- Issuer metadata storage
|
|
|
|
### 7.8 Trust Calibration Service (Enterprise)
|
|
|
|
- Organization-specific trust tuning
|
|
- Custom trust weightings
|
|
- Historical trust analysis
|
|
|
|
---
|
|
|
|
## 8. Reachability Analysis
|
|
|
|
### 8.1 Static Call Graph
|
|
|
|
- Function-level call graph construction
|
|
- Cross-module call tracking
|
|
- Entry point identification
|
|
- Path enumeration
|
|
|
|
### 8.2 Entrypoint Detection
|
|
|
|
- 9+ framework types supported
|
|
- HTTP endpoints
|
|
- CLI entry points
|
|
- Event handlers
|
|
- Message consumers
|
|
- Scheduled tasks
|
|
|
|
### 8.3 BFS Reachability
|
|
|
|
- Breadth-first path search
|
|
- Shortest path calculation
|
|
- All paths enumeration
|
|
- Path filtering
|
|
|
|
### 8.4 Three-Layer Reachability Proofs
|
|
|
|
- **Layer 1 (Static)**: Call graph path from entrypoint to vulnerable function
|
|
- **Layer 2 (Binary)**: Compiled binary contains symbol with matching offset
|
|
- **Layer 3 (Runtime)**: eBPF probe confirms function execution
|
|
|
|
### 8.5 Confidence Tiers
|
|
|
|
- **Confirmed**: All three layers agree
|
|
- **Likely**: Static + binary agree; no runtime data
|
|
- **Present**: Package present; no reachability evidence
|
|
- **Unreachable**: Static analysis proves no path exists
|
|
|
|
### 8.6 Binary Loader Resolution (Community/Enterprise)
|
|
|
|
- ELF dynamic linking resolution
|
|
- PE import table analysis
|
|
- Mach-O load command parsing
|
|
|
|
### 8.7 Feature Flag/Config Gating (Community/Enterprise)
|
|
|
|
- Configuration-based path analysis
|
|
- Feature flag detection
|
|
- Conditional path evaluation
|
|
|
|
### 8.8 Runtime Signal Correlation (Enterprise)
|
|
|
|
- Zastava integration for runtime signals
|
|
- eBPF-based function tracing
|
|
- Actual execution path verification
|
|
|
|
### 8.9 Gate Detection (Enterprise)
|
|
|
|
- Authentication gate detection
|
|
- Authorization check identification
|
|
- Admin-only path detection
|
|
|
|
### 8.10 Path Witness Generation (Enterprise)
|
|
|
|
- Audit evidence for reachability claims
|
|
- Detailed path documentation
|
|
- Witness verification
|
|
|
|
### 8.11 Reachability Drift Detection
|
|
|
|
- Cross-version reachability comparison
|
|
- Path change detection
|
|
- Risk delta calculation
|
|
|
|
### 8.12 Reachability Mini-Map API (Enterprise)
|
|
|
|
- UI visualization data
|
|
- Compact graph representation
|
|
- Interactive exploration support
|
|
|
|
### 8.13 Runtime Timeline API (Enterprise)
|
|
|
|
- Temporal execution analysis
|
|
- Time-based function tracking
|
|
- Historical runtime data
|
|
|
|
---
|
|
|
|
## 9. Binary Analysis
|
|
|
|
### 9.1 Binary Identity Extraction
|
|
|
|
- Build-ID extraction
|
|
- SHA-256 hash computation
|
|
- Content-addressed identification
|
|
- Metadata extraction
|
|
|
|
### 9.2 Binary Format Parsers (Community/Enterprise)
|
|
|
|
- **ELF** (Linux) parser
|
|
- **PE** (Windows) parser
|
|
- **Mach-O** (macOS) parser
|
|
|
|
### 9.3 Build-ID Vulnerability Lookup
|
|
|
|
- Direct build-ID to CVE mapping
|
|
- Pre-computed vulnerability databases
|
|
|
|
### 9.4 Binary Corpus Support
|
|
|
|
- **Debian/Ubuntu Corpus** (all tiers)
|
|
- **RPM/RHEL Corpus** (Community/Enterprise)
|
|
|
|
### 9.5 Patch-Aware Backport Detection (Community/Enterprise)
|
|
|
|
- Distribution patch tracking
|
|
- Backported fix detection
|
|
- False positive reduction
|
|
|
|
### 9.6 Binary Fingerprint Generation (Enterprise)
|
|
|
|
- Function-level fingerprints
|
|
- Code similarity hashing
|
|
- Version-independent matching
|
|
|
|
### 9.7 Fingerprint Matching Engine (Enterprise)
|
|
|
|
- Similarity search across binaries
|
|
- Fuzzy matching for modified code
|
|
- Large-scale fingerprint database
|
|
|
|
### 9.8 DWARF/Symbol Analysis (Enterprise)
|
|
|
|
- Debug symbol parsing
|
|
- Source location mapping
|
|
- Type information extraction
|
|
|
|
### 9.9 Symbol Resolution (Symbols Module)
|
|
|
|
- Symbol table parsing
|
|
- Name demangling
|
|
- Cross-reference building
|
|
- Symbol repository
|
|
|
|
---
|
|
|
|
## 10. Policy Engine
|
|
|
|
### 10.1 Policy Rule Formats
|
|
|
|
- **YAML Policy Rules** (all tiers)
|
|
- **OPA/Rego Integration** (Enterprise)
|
|
- **Score Policy YAML** (Enterprise)
|
|
|
|
### 10.2 Belnap K4 Four-Valued Logic
|
|
|
|
- Unknown (no information)
|
|
- True (positive assertion)
|
|
- False (negative assertion)
|
|
- Conflict (contradictory assertions)
|
|
|
|
### 10.3 Security Atoms (6 Types)
|
|
|
|
- **PRESENT**: Package is present in artifact
|
|
- **APPLIES**: CVE applies to package version
|
|
- **REACHABLE**: Vulnerable code is reachable
|
|
- **MITIGATED**: Compensating controls exist
|
|
- **FIXED**: Vulnerability is fixed
|
|
- **MISATTRIBUTED**: CVE incorrectly assigned
|
|
|
|
### 10.4 Policy Gates
|
|
|
|
- **Minimum Confidence Gate**: Enforce minimum confidence threshold
|
|
- **Unknowns Budget Gate** (Community/Enterprise): Limit acceptable unknowns
|
|
- **Source Quota Gate** (Enterprise): 60% source cap enforcement
|
|
- **Reachability Requirement Gate** (Enterprise): Require reachability proof for criticals
|
|
- **Evidence Freshness Gate**: Enforce evidence age limits
|
|
- **VEX Trust Gate**: VEX-based policy decisions
|
|
- **Drift Gate**: Reachability drift enforcement
|
|
- **Stability Damping Gate**: Noise reduction
|
|
|
|
### 10.5 Disposition Selection
|
|
|
|
- ECMA-424 compliant disposition mapping
|
|
- Deterministic outcome selection
|
|
- Traceable decision paths
|
|
|
|
### 10.6 Exception Objects & Workflow (Enterprise)
|
|
|
|
- Time-bound exceptions
|
|
- Approval chain management
|
|
- Exception tracking
|
|
|
|
### 10.7 Policy Version History (Enterprise)
|
|
|
|
- Full policy change audit trail
|
|
- Policy rollback capability
|
|
- Version comparison
|
|
|
|
### 10.8 Configurable Scoring Profiles (Enterprise)
|
|
|
|
- Simple profile (basic scoring)
|
|
- Advanced profile (multi-factor scoring)
|
|
- Custom profile creation
|
|
|
|
---
|
|
|
|
## 11. Attestation & Signing
|
|
|
|
### 11.1 DSSE Envelope Signing
|
|
|
|
- Detached signature envelopes
|
|
- Canonical JSON payloads
|
|
- Multi-signature support
|
|
|
|
### 11.2 in-toto Statement Structure
|
|
|
|
- Statement v1 format
|
|
- Subject binding to artifacts
|
|
- Predicate flexibility
|
|
|
|
### 11.3 Attestation Predicates
|
|
|
|
- **SBOM Predicate**: SBOM content attestation
|
|
- **VEX Predicate**: VEX statement attestation
|
|
- **Reachability Predicate** (Community/Enterprise): Reachability proof attestation
|
|
- **Policy Decision Predicate** (Community/Enterprise): Policy outcome attestation
|
|
- **Human Approval Predicate** (Enterprise): Manual approval attestation
|
|
- **Boundary Predicate** (Enterprise): Network exposure attestation
|
|
|
|
### 11.4 Verdict Manifest
|
|
|
|
- Signed verdict bundles (Community/Enterprise)
|
|
- Complete decision documentation
|
|
- Replay verification support
|
|
|
|
### 11.5 Key Management
|
|
|
|
- Ephemeral OIDC/keyless signing
|
|
- Short-lived key support
|
|
- HSM/KMS integration
|
|
- Key rotation management (Enterprise)
|
|
|
|
### 11.6 SLSA Provenance (Enterprise)
|
|
|
|
- SLSA v1.0 provenance attestations
|
|
- Build provenance capture
|
|
- Supply chain attestation
|
|
|
|
### 11.7 Transparency Logging
|
|
|
|
- **Rekor Transparency Log** (Enterprise): Public attestation logging
|
|
- **Cosign Integration** (Enterprise): Sigstore ecosystem compatibility
|
|
- Inclusion proof storage
|
|
- Local transparency mirror for offline
|
|
|
|
---
|
|
|
|
## 12. Regional Cryptography
|
|
|
|
### 12.1 Default Cryptography
|
|
|
|
- **Ed25519** signing (default)
|
|
- Modern elliptic curve cryptography
|
|
- High performance signing/verification
|
|
|
|
### 12.2 FIPS 140-2/3 Mode
|
|
|
|
- ECDSA P-256 signing
|
|
- RSA-PSS signing
|
|
- US Federal compliance
|
|
- FIPS-validated modules
|
|
|
|
### 12.3 eIDAS Signatures
|
|
|
|
- ETSI TS 119 312 compliance
|
|
- EU qualified electronic signatures
|
|
- European compliance
|
|
|
|
### 12.4 GOST/CryptoPro
|
|
|
|
- GOST R 34.10-2012 signing
|
|
- Russian Federation compliance
|
|
- CryptoPro integration
|
|
|
|
### 12.5 SM National Standard
|
|
|
|
- GM/T 0003.2-2012 compliance
|
|
- SM2 signing algorithm
|
|
- China compliance
|
|
|
|
### 12.6 Post-Quantum Cryptography
|
|
|
|
- **Dilithium** signing (NIST PQC)
|
|
- **Falcon** signing support
|
|
- Future-proof security
|
|
|
|
### 12.7 Crypto Plugin Architecture
|
|
|
|
- Custom HSM integration
|
|
- Pluggable crypto providers
|
|
- Multi-signature DSSE envelopes (sign with multiple profiles)
|
|
|
|
### 12.8 RootPack Bundles
|
|
|
|
- Pre-configured trust root packages
|
|
- Regional trust root distribution
|
|
- Offline trust root updates
|
|
|
|
---
|
|
|
|
## 13. Risk Scoring & Assessment
|
|
|
|
### 13.1 Score Display
|
|
|
|
- CVSS v4.0/v3.1/v2.0 display
|
|
- EPSS v4 probability display
|
|
- Composite risk scores
|
|
|
|
### 13.2 Priority Band Classification
|
|
|
|
- Critical/High/Medium/Low/Informational bands
|
|
- Configurable band thresholds
|
|
- Multi-factor classification
|
|
|
|
### 13.3 EPSS-at-Scan Immutability (Community/Enterprise)
|
|
|
|
- EPSS score captured at scan time
|
|
- Historical score preservation
|
|
- Score drift tracking
|
|
|
|
### 13.4 Unified Confidence Model (Community/Enterprise)
|
|
|
|
- 5-factor confidence scoring
|
|
- Source confidence weighting
|
|
- Evidence strength assessment
|
|
|
|
### 13.5 Entropy-Based Scoring (Enterprise)
|
|
|
|
- Information-theoretic risk assessment
|
|
- Uncertainty quantification
|
|
|
|
### 13.6 Gate Multipliers (Enterprise)
|
|
|
|
- Reachability-aware score adjustment
|
|
- Gate-based risk modification
|
|
|
|
### 13.7 Unknowns Pressure Factor (Enterprise)
|
|
|
|
- Uncertainty budget enforcement
|
|
- Unknown count impact on risk
|
|
|
|
### 13.8 Custom Scoring Profiles (Enterprise)
|
|
|
|
- Organization-specific scoring
|
|
- Factor weight customization
|
|
- Profile versioning
|
|
|
|
### 13.9 Score Explanation Arrays
|
|
|
|
- Per-finding score breakdown
|
|
- Factor contribution transparency
|
|
- Decision audit support
|
|
|
|
---
|
|
|
|
## 14. Evidence Management
|
|
|
|
### 14.1 Findings List
|
|
|
|
- Comprehensive finding catalog
|
|
- Filtering and sorting
|
|
- Export capabilities
|
|
|
|
### 14.2 Evidence Graph View
|
|
|
|
- Visual evidence relationships
|
|
- Interactive exploration
|
|
- Dependency visualization
|
|
|
|
### 14.3 Findings Ledger (Enterprise)
|
|
|
|
- Immutable finding history
|
|
- Audit trail for all findings
|
|
- Finding lifecycle tracking
|
|
|
|
### 14.4 Evidence Locker (Enterprise)
|
|
|
|
- Sealed evidence storage
|
|
- Tamper-evident packaging
|
|
- Import/export capabilities
|
|
|
|
### 14.5 Evidence TTL Policies (Enterprise)
|
|
|
|
- Configurable retention rules
|
|
- Automatic expiration
|
|
- Compliance-driven retention
|
|
|
|
### 14.6 Evidence Size Budgets (Enterprise)
|
|
|
|
- Storage governance
|
|
- Quota enforcement
|
|
- Capacity planning
|
|
|
|
### 14.7 Retention Tiers (Enterprise)
|
|
|
|
- Hot tier (immediate access)
|
|
- Warm tier (near-line storage)
|
|
- Cold tier (archive storage)
|
|
|
|
### 14.8 Privacy Controls (Enterprise)
|
|
|
|
- Sensitive data redaction
|
|
- PII handling
|
|
- Anonymization support
|
|
|
|
### 14.9 Audit Pack Export (Enterprise)
|
|
|
|
- Compliance bundle generation
|
|
- Regulatory export formats
|
|
- Complete evidence packaging
|
|
|
|
---
|
|
|
|
## 15. Determinism & Reproducibility
|
|
|
|
### 15.1 Canonical JSON Serialization
|
|
|
|
- RFC 8785 compliant serialization
|
|
- Sorted keys
|
|
- Minimal escaping
|
|
- Consistent number formatting
|
|
|
|
### 15.2 Content-Addressed IDs
|
|
|
|
- SHA-256 based identification
|
|
- Immutable references
|
|
- Deduplication support
|
|
|
|
### 15.3 Replay Manifest (SRM)
|
|
|
|
- Complete scan input capture
|
|
- Version pinning
|
|
- Configuration recording
|
|
|
|
### 15.4 Replay Verification
|
|
|
|
- `stella replay` CLI command
|
|
- Digest assertion
|
|
- Bit-for-bit comparison
|
|
|
|
### 15.5 Evidence Freshness Multipliers (Community/Enterprise)
|
|
|
|
- Age-based confidence adjustment
|
|
- Decay algorithms
|
|
- Freshness enforcement
|
|
|
|
### 15.6 Proof Coverage Metrics (Community/Enterprise)
|
|
|
|
- Evidence completeness measurement
|
|
- Gap identification
|
|
- Coverage reporting
|
|
|
|
### 15.7 Fidelity Metrics (Enterprise)
|
|
|
|
- **BF** (Base Fidelity): Input quality
|
|
- **SF** (Scan Fidelity): Detection quality
|
|
- **PF** (Proof Fidelity): Evidence quality
|
|
- Audit dashboard integration
|
|
|
|
### 15.8 FN-Drift Rate Tracking (Enterprise)
|
|
|
|
- False negative monitoring
|
|
- Quality trend analysis
|
|
- Alert thresholds
|
|
|
|
### 15.9 Determinism Gate CI (Enterprise)
|
|
|
|
- Automated determinism testing
|
|
- CI/CD integration
|
|
- Drift prevention
|
|
|
|
---
|
|
|
|
## 16. CLI Features
|
|
|
|
### 16.1 Core Commands
|
|
|
|
- `stella scan` - Container image scanning
|
|
- `stella sbom` - SBOM generation and inspection
|
|
- `stella vex` - VEX evaluation and generation
|
|
- `stella advisory` - Advisory management
|
|
- `stella policy` - Policy evaluation
|
|
- `stella replay` - Deterministic replay
|
|
|
|
### 16.2 SBOM Commands
|
|
|
|
- `stella sbom generate` - Generate SBOM from image
|
|
- `stella sbom inspect` - View SBOM contents
|
|
- `stella sbom diff` - Compare SBOMs
|
|
- `stella sbom validate` - Validate SBOM format
|
|
- `stella sbom convert` - Convert between formats
|
|
|
|
### 16.3 VEX Commands
|
|
|
|
- `stella vex evaluate` - Evaluate VEX statements
|
|
- `stella vex generate` - Generate VEX documents
|
|
- `stella vex import` - Import VEX from file
|
|
- `stella vex export` - Export VEX statements
|
|
|
|
### 16.4 Attestation Commands
|
|
|
|
- `stella attest sign` - Sign attestations
|
|
- `stella attest verify` (Community/Enterprise) - Verify attestations
|
|
- `stella attest export` - Export attestations
|
|
|
|
### 16.5 Reachability Commands
|
|
|
|
- `stella reachability analyze` - Run reachability analysis
|
|
- `stella graph show` - Display reachability graph
|
|
- `stella reachability export` - Export reachability data
|
|
|
|
### 16.6 Risk Commands
|
|
|
|
- `stella risk evaluate` - Calculate risk scores
|
|
- `stella risk report` - Generate risk reports
|
|
|
|
### 16.7 Policy Commands
|
|
|
|
- `stella policy evaluate` - Run policy evaluation
|
|
- `stella policy validate` - Validate policy files
|
|
- `stella policy export` - Export policy decisions
|
|
|
|
### 16.8 Offline Commands
|
|
|
|
- `stella rootpack import` - Import trust root bundles
|
|
- `stella offline sync` - Sync offline data
|
|
- `stella offline verify` - Verify offline package
|
|
|
|
### 16.9 Database Commands
|
|
|
|
- `stella db update` - Update vulnerability database
|
|
- `stella db status` - Check database status
|
|
- `stella db export` - Export database snapshot
|
|
|
|
### 16.10 Export Commands
|
|
|
|
- `stella export sarif` - Export SARIF format
|
|
- `stella export json` - Export JSON format
|
|
- `stella export csv` - Export CSV format
|
|
- `stella export audit-pack` (Enterprise) - Export audit bundle
|
|
|
|
### 16.11 Administrative Commands (Enterprise)
|
|
|
|
- `stella admin` - Administrative utilities
|
|
- `stella symbols` - Symbol resolution commands
|
|
- `stella notify` - Notification management
|
|
- `stella orchestrator` - Workflow control
|
|
|
|
### 16.12 CLI Technical Features
|
|
|
|
- Native AOT compilation
|
|
- Cross-platform support (linux-x64, linux-arm64, osx-x64, osx-arm64, win-x64)
|
|
- Machine-readable output (JSON, NDJSON)
|
|
- Exit codes for CI/CD integration
|
|
- Environment variable configuration
|
|
|
|
---
|
|
|
|
## 17. Web UI Features
|
|
|
|
### 17.1 Core Interface
|
|
|
|
- Dark/Light mode toggle
|
|
- Responsive design
|
|
- Locale support (Cyrillic, etc.) (Community/Enterprise)
|
|
- Keyboard shortcuts (Enterprise)
|
|
|
|
### 17.2 Findings View
|
|
|
|
- Findings Row Component
|
|
- Filtering and sorting
|
|
- Bulk actions
|
|
- Export capabilities
|
|
|
|
### 17.3 Evidence Visualization
|
|
|
|
- Evidence Drawer panel
|
|
- Proof Tab for attestations
|
|
- Evidence Graph View
|
|
- Confidence Meter
|
|
|
|
### 17.4 VEX Interface
|
|
|
|
- VEX Conflict Studio UI
|
|
- Claim Comparison Table (Enterprise)
|
|
- Trust Algebra Panel (Enterprise)
|
|
|
|
### 17.5 Reachability Visualization
|
|
|
|
- Reachability Mini-Map (Enterprise)
|
|
- Path visualization
|
|
- Call graph explorer
|
|
|
|
### 17.6 Policy Interface
|
|
|
|
- Policy Chips Display (Enterprise)
|
|
- Gate status visualization
|
|
- Policy decision trace
|
|
|
|
### 17.7 Triage Features
|
|
|
|
- Triage Canvas component
|
|
- Vulnerability triage workflow
|
|
- Status management
|
|
- Assignment capabilities
|
|
|
|
### 17.8 Timeline Features (Enterprise)
|
|
|
|
- Runtime Timeline view
|
|
- Historical execution data
|
|
- Temporal analysis
|
|
|
|
### 17.9 Administrative Features (Enterprise)
|
|
|
|
- Audit Trail UI
|
|
- Knowledge Snapshot UI (air-gap prep)
|
|
- Operator/Auditor Toggle (role separation)
|
|
- Reproduce Verdict Button
|
|
|
|
### 17.10 Noise Gating UI
|
|
|
|
- Delta visualization
|
|
- Gating statistics
|
|
- Noise reduction controls
|
|
|
|
---
|
|
|
|
## 18. Offline & Air-Gap Operations
|
|
|
|
### 18.1 Offline Update Kits (OUK)
|
|
|
|
- Complete feed bundles
|
|
- Monthly (Community) / Weekly (Enterprise) updates
|
|
- Signed packages
|
|
|
|
### 18.2 Knowledge Snapshots (Enterprise)
|
|
|
|
- Sealed feed exports
|
|
- Complete knowledge state capture
|
|
- Merkle root verification
|
|
|
|
### 18.3 Offline Signature Verification (Community/Enterprise)
|
|
|
|
- Local verification without network
|
|
- Embedded revocation lists
|
|
- Cached trust roots
|
|
|
|
### 18.4 Offline JWT Tokens (Enterprise)
|
|
|
|
- 90-day offline tokens
|
|
- Local token validation
|
|
- Extended offline operation
|
|
|
|
### 18.5 Air-Gap Bundle Manifest (Enterprise)
|
|
|
|
- Transfer package specification
|
|
- Integrity verification
|
|
- Import/export workflows
|
|
|
|
### 18.6 No-Egress Enforcement (Enterprise)
|
|
|
|
- Strict network isolation
|
|
- Egress policy enforcement
|
|
- Connectivity validation
|
|
|
|
### 18.7 Offline Components
|
|
|
|
- Mirrored vulnerability feeds
|
|
- Local transparency log mirror
|
|
- RootPack trust bundles
|
|
- Embedded revocation lists
|
|
|
|
### 18.8 One-Command Replay (Community/Enterprise)
|
|
|
|
- `stella replay srm.yaml` for offline verification
|
|
- No network required for replay
|
|
- Complete evidence bundle
|
|
|
|
---
|
|
|
|
## 19. Deployment Options
|
|
|
|
### 19.1 Docker Compose
|
|
|
|
- Single-node deployment (all tiers)
|
|
- Development environment setup
|
|
- Quick start configuration
|
|
|
|
### 19.2 Helm Chart (Community/Enterprise)
|
|
|
|
- Kubernetes deployment
|
|
- Configurable replicas
|
|
- Resource management
|
|
- Secret management
|
|
|
|
### 19.3 High Availability (Enterprise)
|
|
|
|
- Multi-replica deployment
|
|
- Load balancing
|
|
- Failover support
|
|
- Disaster recovery
|
|
|
|
### 19.4 Horizontal Scaling (Enterprise)
|
|
|
|
- Auto-scaling support
|
|
- Workload distribution
|
|
- Resource optimization
|
|
|
|
### 19.5 Dedicated Capacity (Enterprise)
|
|
|
|
- Reserved resources
|
|
- Guaranteed performance
|
|
- Isolation options
|
|
|
|
### 19.6 Infrastructure Requirements
|
|
|
|
- **PostgreSQL 16+**: Primary database
|
|
- **Valkey 8.0+**: Caching and queuing
|
|
- **RustFS (S3)** (Community/Enterprise): Object storage
|
|
|
|
### 19.7 Container Images
|
|
|
|
- Multi-architecture support (amd64, arm64)
|
|
- Minimal base images
|
|
- Regular security updates
|
|
|
|
---
|
|
|
|
## 20. Authentication & Authorization
|
|
|
|
### 20.1 Authentication Methods
|
|
|
|
- **Basic Auth**: Username/password (all tiers)
|
|
- **API Keys**: Token-based access (all tiers)
|
|
- **SSO/SAML**: Okta, Azure AD integration (all tiers)
|
|
- **OIDC Support**: OpenID Connect with discovery (all tiers)
|
|
|
|
### 20.2 OAuth 2.0 Grant Types
|
|
|
|
- **Client Credentials**: Service-to-service authentication
|
|
- **Resource Owner Password Credentials**: User login
|
|
- **Authorization Code + PKCE**: Browser-based UI flows
|
|
- **Device Code**: CLI login on headless agents
|
|
- **Refresh Token Grant**: DPoP-bound or mTLS constrained
|
|
|
|
### 20.3 Sender-Constraint Technologies
|
|
|
|
#### DPoP (Demonstration of Proof-of-Possession)
|
|
- Proof JWT on every HTTP request
|
|
- Token bound via `cnf.jkt` (JWK thumbprint)
|
|
- Replay prevention with JTI cache
|
|
- Nonce support for high-value services
|
|
|
|
#### mTLS (Mutual TLS Binding)
|
|
- Client certificate-bound tokens
|
|
- Token carries `cnf.x5t#S256` (cert thumbprint)
|
|
- Enforced for high-value audiences (Signer, Attestor)
|
|
- Certificate chain validation
|
|
|
|
### 20.4 Token Management
|
|
|
|
- **Access Token (OpTok)**: 120-300 second TTL
|
|
- **Refresh Tokens**: Optional, short-lived (≤ 8h), rotating
|
|
- Token refresh (12h Free / 30d Community / Annual Enterprise)
|
|
- Short-lived key support
|
|
- JWT format with custom claims
|
|
|
|
### 20.5 Identity Provider Plugins
|
|
|
|
- **Standard Plugin**: Local username/password, MFA support
|
|
- **LDAP Plugin**: Active Directory / OpenLDAP integration
|
|
- **OIDC Plugin**: External OIDC provider federation
|
|
- **SAML Plugin**: SAML 2.0 assertion processing
|
|
|
|
### 20.6 RBAC (Role-Based Access Control)
|
|
|
|
- **Basic RBAC**: User/Admin roles (all tiers)
|
|
- **Advanced RBAC** (Enterprise): Team-based scopes, custom roles
|
|
- 70+ granular permission scopes
|
|
- Scope-based authorization enforcement
|
|
|
|
### 20.7 Scope Categories
|
|
|
|
- **Authority Admin**: `authority:tenants.*`, `authority:users.*`, `authority:roles.*`
|
|
- **Scanner**: `scanner:read`, `scanner:scan`, `scanner:export`
|
|
- **Signer**: `signer:read`, `signer:sign`, `signer:rotate`
|
|
- **Policy**: `policy:write`, `policy:review`, `policy:approve`, `policy:publish`
|
|
- **VulnExplorer**: `vuln:view`, `vuln:investigate`, `vuln:operate`
|
|
- **VEX**: `vex:read`, `vex:ingest`
|
|
- **Graph**: `graph:read`, `graph:write`, `graph:export`
|
|
- **Evidence**: `evidence:create`, `evidence:read`, `evidence:hold`
|
|
- **Attestation**: `attest:read`, `attest:create`, `attest:admin`
|
|
- **Observability**: `obs:read`, `obs:incident`, `timeline:read`
|
|
|
|
### 20.8 ABAC (Attribute-Based Access Control)
|
|
|
|
- Environment attribute filtering (`stellaops:attr:env`)
|
|
- Ownership visibility (`stellaops:attr:owner`)
|
|
- Business tier filtering (`stellaops:attr:business_tier`)
|
|
|
|
### 20.9 Multi-Tenant Management (Enterprise)
|
|
|
|
- Organization hierarchy
|
|
- Tenant isolation via `tid` claim
|
|
- Installation isolation via `inst` claim
|
|
- Cross-tenant policy enforcement
|
|
|
|
### 20.10 Specialized Tokens
|
|
|
|
- **Incident Mode Tokens**: 5-minute freshness, requires human reason
|
|
- **Vulnerability Workflow Tokens**: Anti-forgery for mutations
|
|
- **Attachment Access Tokens**: Evidence bundle downloads
|
|
- **Acknowledgment Tokens**: Notification workflows
|
|
|
|
### 20.11 Security Features
|
|
|
|
- Password lockout with configurable attempts
|
|
- Key rotation (30-90 day cadence, zero-downtime)
|
|
- KMS/HSM support (private keys never leave)
|
|
- Rate limiting (per-client, per-IP, per-endpoint)
|
|
- PKCE required for Authorization Code flow
|
|
|
|
### 20.12 Audit Logging (Enterprise)
|
|
|
|
- Token issuance audit (sub, aud, scopes, tid, jti)
|
|
- Revocation events
|
|
- Admin changes (client/user/role)
|
|
- Credential attempt tracking with failure codes
|
|
- DPoP/mTLS validation events
|
|
- SIEM integration
|
|
- User activity tracking
|
|
|
|
---
|
|
|
|
## 21. Integrations & Notifications
|
|
|
|
### 21.1 Notification Channels
|
|
|
|
- **In-App Notifications** (all tiers)
|
|
- **Email Notifications** (Community/Enterprise)
|
|
- **Slack Integration** (all tiers)
|
|
- **Microsoft Teams Integration** (all tiers)
|
|
|
|
### 21.2 Alert Types
|
|
|
|
- New vulnerability alerts
|
|
- EPSS change alerts (Community/Enterprise)
|
|
- Policy violation alerts
|
|
- Scan completion notifications
|
|
|
|
### 21.3 Registry Integration
|
|
|
|
- **Zastava Registry Hooks**: Auto-scan on container push (all tiers)
|
|
- Registry webhook observer
|
|
- Event-driven scanning
|
|
|
|
### 21.4 CI/CD Integration (Enterprise)
|
|
|
|
- GitLab CI/CD gates
|
|
- GitHub Actions integration
|
|
- Jenkins plugin
|
|
- Custom webhook endpoints
|
|
|
|
### 21.5 Custom Webhooks (Enterprise)
|
|
|
|
- Configurable endpoints
|
|
- Event filtering
|
|
- Payload customization
|
|
|
|
### 21.6 Enterprise Connectors (Enterprise)
|
|
|
|
- Grid/Premium API access
|
|
- Custom connector development
|
|
- Third-party integration support
|
|
|
|
### 21.7 Gateway & Router
|
|
|
|
- API gateway with routing
|
|
- Transport abstraction (TCP/TLS/UDP/RabbitMQ/Valkey)
|
|
- Rate limiting
|
|
- Request routing
|
|
|
|
---
|
|
|
|
## 22. Observability & Telemetry
|
|
|
|
### 22.1 Metrics
|
|
|
|
- Basic metrics (all tiers)
|
|
- Scan performance metrics
|
|
- Resource utilization metrics
|
|
- Error rate tracking
|
|
|
|
### 22.2 OpenTelemetry (Enterprise)
|
|
|
|
- Full distributed tracing
|
|
- Trace context propagation
|
|
- Custom span attributes
|
|
|
|
### 22.3 Prometheus Export (Enterprise)
|
|
|
|
- Prometheus metric format
|
|
- Custom metrics endpoints
|
|
- Grafana dashboard support
|
|
|
|
### 22.4 Telemetry Options
|
|
|
|
- Opt-in telemetry (all tiers)
|
|
- Telemetry configuration
|
|
- Privacy controls
|
|
|
|
### 22.5 Quality KPIs Dashboard (Enterprise)
|
|
|
|
- Triage metrics
|
|
- Detection accuracy
|
|
- Coverage statistics
|
|
|
|
### 22.6 SLA Monitoring (Enterprise)
|
|
|
|
- Uptime tracking
|
|
- Performance monitoring
|
|
- SLA compliance reporting
|
|
|
|
### 22.7 Logging
|
|
|
|
- Structured logging
|
|
- Log levels configuration
|
|
- Log aggregation support
|
|
|
|
---
|
|
|
|
## 23. Scheduling & Automation
|
|
|
|
### 23.1 Manual Scans
|
|
|
|
- On-demand scanning (all tiers)
|
|
- CLI-triggered scans
|
|
- UI-initiated scans
|
|
|
|
### 23.2 Scheduled Scans (Enterprise)
|
|
|
|
- Cron-based scheduling
|
|
- Recurring scan configuration
|
|
- Schedule management
|
|
|
|
### 23.3 Event-Driven Scanning (Enterprise)
|
|
|
|
- Registry push triggers
|
|
- Webhook-initiated scans
|
|
- Pipeline integration
|
|
|
|
### 23.4 Task Pack Orchestration (Enterprise)
|
|
|
|
- Declarative workflow definition
|
|
- Task pack execution
|
|
- Plan-hash binding
|
|
- Approval gates
|
|
- Sealed mode for air-gap
|
|
|
|
### 23.5 EPSS Daily Refresh (Enterprise)
|
|
|
|
- Automatic EPSS updates
|
|
- Score recalculation
|
|
- Delta notifications
|
|
|
|
### 23.6 Scheduler Features
|
|
|
|
- Job queue management
|
|
- Priority scheduling
|
|
- Resource allocation
|
|
- Failure retry policies
|
|
|
|
### 23.7 Orchestrator Features
|
|
|
|
- Workflow coordination
|
|
- Task dependency management
|
|
- Parallel execution
|
|
- Status tracking
|
|
|
|
---
|
|
|
|
## 24. Version Comparison
|
|
|
|
### 24.1 Package Version Formats
|
|
|
|
- **RPM (NEVRA)**: Name-Epoch-Version-Release-Architecture
|
|
- **Debian (EVR)**: Epoch-Version-Release
|
|
- **Alpine (APK)**: Alpine package versioning
|
|
- **SemVer**: Semantic versioning (major.minor.patch)
|
|
|
|
### 24.2 PURL Resolution
|
|
|
|
- Package URL parsing
|
|
- Ecosystem-aware resolution
|
|
- Version normalization
|
|
|
|
### 24.3 Version Range Matching
|
|
|
|
- Affected version range detection
|
|
- Fixed version identification
|
|
- Upgrade path calculation
|
|
|
|
---
|
|
|
|
## 25. Database & Storage
|
|
|
|
### 25.1 PostgreSQL Features
|
|
|
|
- PostgreSQL 16+ support
|
|
- Per-module schema isolation
|
|
- Row-Level Security (RLS) for multi-tenancy
|
|
- Connection pooling
|
|
|
|
### 25.2 Valkey/Redis Features
|
|
|
|
- Valkey 8.0+ support
|
|
- Caching layer
|
|
- Job queue backend
|
|
- Session storage
|
|
|
|
### 25.3 Object Storage (RustFS/S3)
|
|
|
|
- S3-compatible storage (Community/Enterprise)
|
|
- Content-addressed blob storage
|
|
- SBOM/evidence storage
|
|
- Artifact storage
|
|
|
|
### 25.4 Storage Features
|
|
|
|
- Content deduplication
|
|
- Compression support
|
|
- Encryption at rest
|
|
- Retention policies
|
|
|
|
---
|
|
|
|
## 26. API Capabilities
|
|
|
|
### 26.1 REST API
|
|
|
|
- RESTful endpoints
|
|
- OpenAPI 3.0 specification
|
|
- JSON request/response
|
|
- Pagination support
|
|
|
|
### 26.2 API Features
|
|
|
|
- Rate limiting (all tiers)
|
|
- 429 Backpressure handling
|
|
- Retry-After headers
|
|
- Priority queue (Enterprise)
|
|
- Burst allowance (Enterprise)
|
|
|
|
### 26.3 Quota Management
|
|
|
|
- Usage API (`/quota`)
|
|
- Scan quota tracking
|
|
- Quota enforcement
|
|
- Custom quotas (Enterprise)
|
|
|
|
### 26.4 API Authentication
|
|
|
|
- API key authentication
|
|
- JWT bearer tokens
|
|
- OAuth 2.0 support
|
|
- DPoP support
|
|
|
|
---
|
|
|
|
## 27. Support & Services
|
|
|
|
### 27.1 Documentation
|
|
|
|
- Comprehensive documentation (all tiers)
|
|
- API reference
|
|
- Architecture guides
|
|
- Tutorials and guides
|
|
|
|
### 27.2 Community Support
|
|
|
|
- Community forums (all tiers)
|
|
- GitHub Issues (all tiers)
|
|
- Documentation wiki
|
|
|
|
### 27.3 Email Support (Enterprise)
|
|
|
|
- Business hours support
|
|
- Ticket-based support
|
|
|
|
### 27.4 Priority Support (Enterprise)
|
|
|
|
- 4-hour response time
|
|
- Priority ticket handling
|
|
|
|
### 27.5 24/7 Critical Support (Enterprise)
|
|
|
|
- Round-the-clock support (add-on)
|
|
- Emergency response
|
|
|
|
### 27.6 Dedicated CSM (Enterprise)
|
|
|
|
- Named customer success manager
|
|
- Regular check-ins
|
|
- Account management
|
|
|
|
### 27.7 Professional Services (Enterprise)
|
|
|
|
- Implementation assistance
|
|
- Custom development
|
|
- Architecture review
|
|
|
|
### 27.8 Training & Certification (Enterprise)
|
|
|
|
- Team enablement
|
|
- Certification programs
|
|
- Custom training
|
|
|
|
### 27.9 SLA Guarantee (Enterprise)
|
|
|
|
- 99.9% uptime guarantee
|
|
- SLA credits
|
|
- Performance guarantees
|
|
|
|
---
|
|
|
|
## Appendix A: Module Reference
|
|
|
|
| Module | Description |
|
|
|--------|-------------|
|
|
| **Authority** | Authentication, authorization, OAuth/OIDC, DPoP |
|
|
| **Gateway** | API gateway with routing and transport abstraction |
|
|
| **Router** | Transport-agnostic messaging |
|
|
| **Concelier** | Vulnerability advisory ingestion and merge engine |
|
|
| **Excititor** | VEX document ingestion and export |
|
|
| **VexLens** | VEX consensus computation across issuers |
|
|
| **VexHub** | VEX distribution and exchange hub |
|
|
| **IssuerDirectory** | Issuer trust registry |
|
|
| **Feedser** | Evidence collection for backport detection |
|
|
| **Mirror** | Vulnerability feed mirror and distribution |
|
|
| **Scanner** | Container scanning with SBOM generation |
|
|
| **BinaryIndex** | Binary identity extraction and fingerprinting |
|
|
| **AdvisoryAI** | AI-assisted advisory analysis |
|
|
| **ReachGraph** | Reachability graph service |
|
|
| **Symbols** | Symbol resolution and debug information |
|
|
| **Attestor** | in-toto/DSSE attestation generation |
|
|
| **Signer** | Cryptographic signing operations |
|
|
| **SbomService** | SBOM storage, versioning, and lineage ledger |
|
|
| **EvidenceLocker** | Sealed evidence storage and export |
|
|
| **ExportCenter** | Batch export and report generation |
|
|
| **Provenance** | SLSA/DSSE attestation tooling |
|
|
| **Policy** | Policy engine with K4 lattice logic |
|
|
| **RiskEngine** | Risk scoring runtime |
|
|
| **VulnExplorer** | Vulnerability exploration and triage UI backend |
|
|
| **Unknowns** | Unknown component and symbol tracking |
|
|
| **Scheduler** | Job scheduling and queue management |
|
|
| **Orchestrator** | Workflow orchestration and task coordination |
|
|
| **TaskRunner** | Task pack execution engine |
|
|
| **Notify** | Notification toolkit |
|
|
| **Notifier** | Notifications Studio host |
|
|
| **PacksRegistry** | Task packs registry and distribution |
|
|
| **TimelineIndexer** | Timeline event indexing |
|
|
| **Replay** | Deterministic replay engine |
|
|
| **CLI** | Command-line interface |
|
|
| **Zastava** | Container registry webhook observer |
|
|
| **Web** | Angular frontend SPA |
|
|
| **Cryptography** | Crypto plugins (FIPS, eIDAS, GOST, SM, PQ) |
|
|
| **Telemetry** | OpenTelemetry traces, metrics, logging |
|
|
| **Graph** | Call graph and reachability data structures |
|
|
| **Signals** | Runtime signal collection and correlation |
|
|
| **AirGap** | Air-gapped deployment support |
|
|
| **AOC** | Append-Only Contract enforcement |
|
|
|
|
---
|
|
|
|
## Appendix B: Supported Standards
|
|
|
|
| Standard | Version | Usage |
|
|
|----------|---------|-------|
|
|
| CycloneDX | 1.7 | Primary SBOM format |
|
|
| SPDX | 3.0.1 | SBOM format |
|
|
| in-toto | Statement v1 | Attestation format |
|
|
| DSSE | v1 | Envelope signing |
|
|
| OpenVEX | Current spec | VEX format |
|
|
| SARIF | 2.1.0 | Findings interchange |
|
|
| Sigstore Rekor | API stable | Transparency logging |
|
|
| SLSA | v1.0 | Provenance attestation |
|
|
|
|
---
|
|
|
|
## Appendix C: Glossary
|
|
|
|
| Term | Definition |
|
|
|------|------------|
|
|
| **SBOM** | Software Bill of Materials - component inventory |
|
|
| **VEX** | Vulnerability Exploitability eXchange - exploitability status |
|
|
| **DSSE** | Dead Simple Signing Envelope - detached signatures |
|
|
| **in-toto** | Software supply chain attestation framework |
|
|
| **K4 Lattice** | Belnap four-valued logic (Unknown, True, False, Conflict) |
|
|
| **SRM** | Scan Replay Manifest - deterministic replay bundle |
|
|
| **PURL** | Package URL - universal package identifier |
|
|
| **NEVRA** | Name-Epoch-Version-Release-Architecture (RPM) |
|
|
| **EVR** | Epoch-Version-Release (Debian) |
|
|
| **KEV** | Known Exploited Vulnerabilities |
|
|
| **EPSS** | Exploit Prediction Scoring System |
|
|
| **OVAL** | Open Vulnerability and Assessment Language |
|
|
|
|
---
|
|
|
|
*Last updated: 4 Jan 2026*
|
|
*For tier availability, see [`04_FEATURE_MATRIX.md`](04_FEATURE_MATRIX.md)*
|