Files
git.stella-ops.org/docs/full-features-list.md
StellaOps Bot 3098e84de4 save progress
2026-01-04 14:54:52 +02:00

1642 lines
40 KiB
Markdown

# Full Features List - Stella Ops
> **Comprehensive catalog of every capability in the Stella Ops platform.**
>
> For quick capability cards with competitive differentiation, see [`key-features.md`](key-features.md).
> For tier-based availability (Free/Community/Enterprise), see [`04_FEATURE_MATRIX.md`](04_FEATURE_MATRIX.md).
---
## Table of Contents
1. [Core Platform Differentiators](#1-core-platform-differentiators)
2. [Container Image Scanning](#2-container-image-scanning)
3. [SBOM Capabilities](#3-sbom-capabilities)
4. [Language Analyzers](#4-language-analyzers)
5. [Vulnerability Detection](#5-vulnerability-detection)
6. [Advisory Sources](#6-advisory-sources)
7. [VEX Processing](#7-vex-processing)
8. [Reachability Analysis](#8-reachability-analysis)
9. [Binary Analysis](#9-binary-analysis)
10. [Policy Engine](#10-policy-engine)
11. [Attestation & Signing](#11-attestation--signing)
12. [Regional Cryptography](#12-regional-cryptography)
13. [Risk Scoring & Assessment](#13-risk-scoring--assessment)
14. [Evidence Management](#14-evidence-management)
15. [Determinism & Reproducibility](#15-determinism--reproducibility)
16. [CLI Features](#16-cli-features)
17. [Web UI Features](#17-web-ui-features)
18. [Offline & Air-Gap Operations](#18-offline--air-gap-operations)
19. [Deployment Options](#19-deployment-options)
20. [Authentication & Authorization](#20-authentication--authorization)
21. [Integrations & Notifications](#21-integrations--notifications)
22. [Observability & Telemetry](#22-observability--telemetry)
23. [Scheduling & Automation](#23-scheduling--automation)
24. [Version Comparison](#24-version-comparison)
25. [Database & Storage](#25-database--storage)
26. [API Capabilities](#26-api-capabilities)
27. [Support & Services](#27-support--services)
---
## 1. Core Platform Differentiators
These are the fundamental capabilities that distinguish Stella Ops from other vulnerability scanners.
### 1.1 Decision Capsules
- **Audit-grade evidence bundles** containing everything needed to reproduce and verify vulnerability decisions
- Content-addressed bundles with exact SBOM, frozen feed snapshots (with Merkle roots), policy version, lattice rules
- Evidence includes reachability proofs (static + runtime), VEX statements, binary fingerprints
- Outputs include verdicts, risk scores, remediation paths
- DSSE signatures over all components
- Six-month-later replay: `stella replay srm.yaml --assert-digest <sha>` produces identical results
### 1.2 Deterministic Replay
- **Bit-for-bit reproducible scans** from frozen feeds and analyzer manifests
- Replay Manifest (SRM) captures exact analyzer inputs/outputs per layer
- Feed snapshots (NVD, KEV, EPSS, distro advisories) with content hashes
- Frozen analyzer versions and configurations
- Frozen policy rules and lattice state
- Random seeds for deterministic ordering
### 1.3 VEX-First Decisioning (K4 Lattice Logic)
- **Belnap K4 four-valued logic** (Unknown, True, False, Conflict)
- VEX as logical claims with trust weighting, not suppression files
- Conflicts are explicit state, not hidden
- Vendor + runtime + reachability merged with conflicts surfaced
- Unknown treated as first-class state with risk implications
### 1.4 Signed Reachability Proofs
- **Three-layer validation** with cryptographic binding
- Every reachability graph sealed with DSSE
- Optional edge-bundle attestations for contested paths
- Proves exploitability with exact call paths from entrypoint to vulnerable function
### 1.5 Sovereign Offline Operation
- **Full functionality without network**
- Air-gapped environments get identical results to connected
- Offline Update Kits bundle everything needed
- Epistemic parity (sealed, reproducible knowledge state)
### 1.6 Smart-Diff (Semantic Risk Delta)
- **Diff security meaning, not CVE counts**
- Compare reachability graphs, policy outcomes, and trust weights between releases
- Output like "Exploitability DECREASED by 67% despite +2 CVEs"
- Material change detection for informed decision-making
### 1.7 Unknowns as First-Class State
- **Explicit modeling of uncertainty**
- Hot/Warm/Cold/Resolved bands for uncertainty tracking
- Decay algorithms for uncertainty resolution
- Blast-radius containment
- Policy budgets ("fail if unknowns > N")
---
## 2. Container Image Scanning
### 2.1 Image Formats
- OCI container images
- Docker images
- Container filesystem archives
- Rootfs directories
- Layer-by-layer analysis
### 2.2 Scanning Modes
- **Quick Mode**: Fast scan for basic vulnerabilities
- **Standard Mode**: Balanced scan with full vulnerability detection
- **Deep Mode**: Comprehensive analysis with reachability and binary analysis
### 2.3 Base Image Detection
- Automatic base image identification
- Base image layer separation
- Inherited vs. application-added package differentiation
### 2.4 Layer-Aware Analysis
- Per-layer package detection
- Layer change tracking
- Delta analysis between layers
- Content-addressed layer caching
### 2.5 Registry Integration
- Pull images by digest (content-addressed)
- Registry authentication support
- Private registry support
- Registry mirror support for offline operation
### 2.6 Scan Performance
- Delta-SBOM cache for warm scans < 1 second
- Concurrent scan workers (1/3/unlimited by tier)
- Content-addressed layer caching
- Incremental analysis for unchanged layers
---
## 3. SBOM Capabilities
### 3.1 SBOM Formats Supported
- **CycloneDX 1.7** (primary output format)
- **CycloneDX 1.6** (backward compatible ingest)
- **SPDX 3.0.1** (full support)
- **SPDX-JSON** (ingest)
- **Trivy-JSON** (ingest)
### 3.2 SBOM Generation
- Automatic SBOM generation from container images
- Package extraction from all supported ecosystems
- Dependency relationship mapping
- Component metadata extraction
- License detection
### 3.3 SBOM Ingestion
- Auto-format detection
- Bring-Your-Own-SBOM (BYOS) support
- Third-party SBOM import
- Validation and normalization
### 3.4 Delta-SBOM Engine
- Content-addressed catalog
- Layer-aware ingestion
- Rescans only fetch new layers
- Warm scans < 1 second
### 3.5 SBOM Diff
- Semantic SBOM comparison
- Package addition/removal detection
- Version change tracking
- License change detection
### 3.6 SBOM Lineage Ledger (Enterprise)
- Full versioned SBOM history
- Lineage tracking across builds
- Traversal queries via Lineage API
- Audit trail for SBOM changes
### 3.7 SBOM Service
- Central SBOM storage and versioning
- Content-addressed storage
- SBOM deduplication
- Retention policies
---
## 4. Language Analyzers
### 4.1 .NET/C# Analyzer
- NuGet package detection
- packages.config parsing
- .csproj/Directory.Build.props parsing
- .NET SDK version detection
- Framework dependency mapping
- Assembly metadata extraction
### 4.2 Java Analyzer
- Maven dependency resolution (pom.xml)
- Gradle build file parsing (build.gradle, build.gradle.kts)
- JAR/WAR/EAR analysis
- MANIFEST.MF parsing
- Java version detection
- Spring Boot dependency detection
### 4.3 Go Analyzer
- go.mod/go.sum parsing
- Go module dependency resolution
- Go version detection
- Vendor directory analysis
- Binary build info extraction
### 4.4 Python Analyzer
- requirements.txt parsing
- Pipfile/Pipfile.lock parsing
- pyproject.toml parsing
- setup.py analysis
- Poetry lockfile support
- Conda environment parsing
- pip freeze output parsing
### 4.5 Node.js Analyzer
- package.json/package-lock.json parsing
- yarn.lock parsing
- pnpm-lock.yaml parsing
- npm shrinkwrap support
- Node.js version detection
- Workspace/monorepo support
### 4.6 Ruby Analyzer
- Gemfile/Gemfile.lock parsing
- Ruby version detection
- Bundler version detection
- Gem specification parsing
### 4.7 Bun Analyzer
- bun.lockb parsing
- package.json processing
- Bun-specific dependency resolution
### 4.8 Deno Analyzer
- deno.json parsing
- Import map resolution
- URL-based dependency tracking
- deno.lock parsing
### 4.9 PHP Analyzer
- composer.json/composer.lock parsing
- PHP version detection
- Packagist dependency resolution
### 4.10 Rust Analyzer
- Cargo.toml/Cargo.lock parsing
- Rust edition detection
- Crates.io dependency resolution
- Build target analysis
### 4.11 Native Binary Analyzer
- ELF binary analysis (Linux)
- PE binary analysis (Windows)
- Mach-O binary analysis (macOS)
- Build-ID extraction
- Symbol table parsing
- Dynamic library dependency detection
---
## 5. Vulnerability Detection
### 5.1 CVE Matching
- CVE lookup via local database
- Package-to-CVE mapping
- Version range matching
- PURL-based matching
### 5.2 Vulnerability Scoring
- CVSS v4.0 display
- CVSS v3.1 support
- CVSS v2.0 legacy support
- EPSS v4 probability scoring
- Priority band classification
### 5.3 Exploitability Assessment
- KEV (Known Exploited Vulnerabilities) flagging
- EPSS probability integration
- Reachability-aware prioritization
- VEX status consideration
### 5.4 License Risk Detection (Planned)
- License identification
- License compatibility analysis
- License risk scoring
- Copyleft detection
---
## 6. Advisory Sources
### 6.1 Primary Sources
- **NVD** (National Vulnerability Database)
- **GHSA** (GitHub Security Advisories)
- **OSV** (Open Source Vulnerabilities)
- **KEV** (Known Exploited Vulnerabilities)
- **EPSS v4** (Exploit Prediction Scoring System)
### 6.2 Distribution-Specific Sources
- **Alpine SecDB**
- **Debian Security Tracker**
- **Ubuntu USN** (Ubuntu Security Notices)
- **RHEL/CentOS OVAL** (Community/Enterprise)
### 6.3 Advisory Processing (Concelier)
- Multi-source advisory ingestion
- Advisory normalization
- Duplicate detection
- Conflict resolution
- Advisory merge engine (Enterprise)
- Custom advisory connectors (Enterprise)
### 6.4 Feed Management
- Automated feed updates
- Feed mirroring for offline operation
- Feed snapshot versioning
- Content-addressed feed storage
---
## 7. VEX Processing
### 7.1 VEX Formats Supported
- **OpenVEX** (primary format)
- **CycloneDX VEX**
- **CSAF VEX** (Community/Enterprise)
### 7.2 VEX Ingestion (Excititor)
- Multi-format VEX import
- VEX validation
- VEX normalization
- Statement extraction
### 7.3 VEX Consensus Engine (VexLens)
- Trust vector scoring (Precision/Coverage/Recency)
- Claim strength multipliers
- Freshness decay algorithms
- Conflict detection and penalty (K4 lattice logic)
- Multi-issuer statement aggregation
### 7.4 Trust Weighting
- Issuer trust scoring
- Statement freshness weighting
- Claim strength assessment
- Conflict penalty calculation
### 7.5 VEX Conflict Resolution
- K4 four-valued logic (Unknown/True/False/Conflict)
- Conflict surfacing (not hiding)
- Visual conflict resolution (VEX Conflict Studio UI)
- Deterministic outcome selection
### 7.6 VEX Hub
- VEX distribution and exchange
- Internal VEX network
- VEX statement sharing
- VEX propagation across supply chain
### 7.7 Issuer Directory
- Issuer trust registry
- CSAF publisher management
- Trust root configuration
- Issuer metadata storage
### 7.8 Trust Calibration Service (Enterprise)
- Organization-specific trust tuning
- Custom trust weightings
- Historical trust analysis
---
## 8. Reachability Analysis
### 8.1 Static Call Graph
- Function-level call graph construction
- Cross-module call tracking
- Entry point identification
- Path enumeration
### 8.2 Entrypoint Detection
- 9+ framework types supported
- HTTP endpoints
- CLI entry points
- Event handlers
- Message consumers
- Scheduled tasks
### 8.3 BFS Reachability
- Breadth-first path search
- Shortest path calculation
- All paths enumeration
- Path filtering
### 8.4 Three-Layer Reachability Proofs
- **Layer 1 (Static)**: Call graph path from entrypoint to vulnerable function
- **Layer 2 (Binary)**: Compiled binary contains symbol with matching offset
- **Layer 3 (Runtime)**: eBPF probe confirms function execution
### 8.5 Confidence Tiers
- **Confirmed**: All three layers agree
- **Likely**: Static + binary agree; no runtime data
- **Present**: Package present; no reachability evidence
- **Unreachable**: Static analysis proves no path exists
### 8.6 Binary Loader Resolution (Community/Enterprise)
- ELF dynamic linking resolution
- PE import table analysis
- Mach-O load command parsing
### 8.7 Feature Flag/Config Gating (Community/Enterprise)
- Configuration-based path analysis
- Feature flag detection
- Conditional path evaluation
### 8.8 Runtime Signal Correlation (Enterprise)
- Zastava integration for runtime signals
- eBPF-based function tracing
- Actual execution path verification
### 8.9 Gate Detection (Enterprise)
- Authentication gate detection
- Authorization check identification
- Admin-only path detection
### 8.10 Path Witness Generation (Enterprise)
- Audit evidence for reachability claims
- Detailed path documentation
- Witness verification
### 8.11 Reachability Drift Detection
- Cross-version reachability comparison
- Path change detection
- Risk delta calculation
### 8.12 Reachability Mini-Map API (Enterprise)
- UI visualization data
- Compact graph representation
- Interactive exploration support
### 8.13 Runtime Timeline API (Enterprise)
- Temporal execution analysis
- Time-based function tracking
- Historical runtime data
---
## 9. Binary Analysis
### 9.1 Binary Identity Extraction
- Build-ID extraction
- SHA-256 hash computation
- Content-addressed identification
- Metadata extraction
### 9.2 Binary Format Parsers (Community/Enterprise)
- **ELF** (Linux) parser
- **PE** (Windows) parser
- **Mach-O** (macOS) parser
### 9.3 Build-ID Vulnerability Lookup
- Direct build-ID to CVE mapping
- Pre-computed vulnerability databases
### 9.4 Binary Corpus Support
- **Debian/Ubuntu Corpus** (all tiers)
- **RPM/RHEL Corpus** (Community/Enterprise)
### 9.5 Patch-Aware Backport Detection (Community/Enterprise)
- Distribution patch tracking
- Backported fix detection
- False positive reduction
### 9.6 Binary Fingerprint Generation (Enterprise)
- Function-level fingerprints
- Code similarity hashing
- Version-independent matching
### 9.7 Fingerprint Matching Engine (Enterprise)
- Similarity search across binaries
- Fuzzy matching for modified code
- Large-scale fingerprint database
### 9.8 DWARF/Symbol Analysis (Enterprise)
- Debug symbol parsing
- Source location mapping
- Type information extraction
### 9.9 Symbol Resolution (Symbols Module)
- Symbol table parsing
- Name demangling
- Cross-reference building
- Symbol repository
---
## 10. Policy Engine
### 10.1 Policy Rule Formats
- **YAML Policy Rules** (all tiers)
- **OPA/Rego Integration** (Enterprise)
- **Score Policy YAML** (Enterprise)
### 10.2 Belnap K4 Four-Valued Logic
- Unknown (no information)
- True (positive assertion)
- False (negative assertion)
- Conflict (contradictory assertions)
### 10.3 Security Atoms (6 Types)
- **PRESENT**: Package is present in artifact
- **APPLIES**: CVE applies to package version
- **REACHABLE**: Vulnerable code is reachable
- **MITIGATED**: Compensating controls exist
- **FIXED**: Vulnerability is fixed
- **MISATTRIBUTED**: CVE incorrectly assigned
### 10.4 Policy Gates
- **Minimum Confidence Gate**: Enforce minimum confidence threshold
- **Unknowns Budget Gate** (Community/Enterprise): Limit acceptable unknowns
- **Source Quota Gate** (Enterprise): 60% source cap enforcement
- **Reachability Requirement Gate** (Enterprise): Require reachability proof for criticals
- **Evidence Freshness Gate**: Enforce evidence age limits
- **VEX Trust Gate**: VEX-based policy decisions
- **Drift Gate**: Reachability drift enforcement
- **Stability Damping Gate**: Noise reduction
### 10.5 Disposition Selection
- ECMA-424 compliant disposition mapping
- Deterministic outcome selection
- Traceable decision paths
### 10.6 Exception Objects & Workflow (Enterprise)
- Time-bound exceptions
- Approval chain management
- Exception tracking
### 10.7 Policy Version History (Enterprise)
- Full policy change audit trail
- Policy rollback capability
- Version comparison
### 10.8 Configurable Scoring Profiles (Enterprise)
- Simple profile (basic scoring)
- Advanced profile (multi-factor scoring)
- Custom profile creation
---
## 11. Attestation & Signing
### 11.1 DSSE Envelope Signing
- Detached signature envelopes
- Canonical JSON payloads
- Multi-signature support
### 11.2 in-toto Statement Structure
- Statement v1 format
- Subject binding to artifacts
- Predicate flexibility
### 11.3 Attestation Predicates
- **SBOM Predicate**: SBOM content attestation
- **VEX Predicate**: VEX statement attestation
- **Reachability Predicate** (Community/Enterprise): Reachability proof attestation
- **Policy Decision Predicate** (Community/Enterprise): Policy outcome attestation
- **Human Approval Predicate** (Enterprise): Manual approval attestation
- **Boundary Predicate** (Enterprise): Network exposure attestation
### 11.4 Verdict Manifest
- Signed verdict bundles (Community/Enterprise)
- Complete decision documentation
- Replay verification support
### 11.5 Key Management
- Ephemeral OIDC/keyless signing
- Short-lived key support
- HSM/KMS integration
- Key rotation management (Enterprise)
### 11.6 SLSA Provenance (Enterprise)
- SLSA v1.0 provenance attestations
- Build provenance capture
- Supply chain attestation
### 11.7 Transparency Logging
- **Rekor Transparency Log** (Enterprise): Public attestation logging
- **Cosign Integration** (Enterprise): Sigstore ecosystem compatibility
- Inclusion proof storage
- Local transparency mirror for offline
---
## 12. Regional Cryptography
### 12.1 Default Cryptography
- **Ed25519** signing (default)
- Modern elliptic curve cryptography
- High performance signing/verification
### 12.2 FIPS 140-2/3 Mode
- ECDSA P-256 signing
- RSA-PSS signing
- US Federal compliance
- FIPS-validated modules
### 12.3 eIDAS Signatures
- ETSI TS 119 312 compliance
- EU qualified electronic signatures
- European compliance
### 12.4 GOST/CryptoPro
- GOST R 34.10-2012 signing
- Russian Federation compliance
- CryptoPro integration
### 12.5 SM National Standard
- GM/T 0003.2-2012 compliance
- SM2 signing algorithm
- China compliance
### 12.6 Post-Quantum Cryptography
- **Dilithium** signing (NIST PQC)
- **Falcon** signing support
- Future-proof security
### 12.7 Crypto Plugin Architecture
- Custom HSM integration
- Pluggable crypto providers
- Multi-signature DSSE envelopes (sign with multiple profiles)
### 12.8 RootPack Bundles
- Pre-configured trust root packages
- Regional trust root distribution
- Offline trust root updates
---
## 13. Risk Scoring & Assessment
### 13.1 Score Display
- CVSS v4.0/v3.1/v2.0 display
- EPSS v4 probability display
- Composite risk scores
### 13.2 Priority Band Classification
- Critical/High/Medium/Low/Informational bands
- Configurable band thresholds
- Multi-factor classification
### 13.3 EPSS-at-Scan Immutability (Community/Enterprise)
- EPSS score captured at scan time
- Historical score preservation
- Score drift tracking
### 13.4 Unified Confidence Model (Community/Enterprise)
- 5-factor confidence scoring
- Source confidence weighting
- Evidence strength assessment
### 13.5 Entropy-Based Scoring (Enterprise)
- Information-theoretic risk assessment
- Uncertainty quantification
### 13.6 Gate Multipliers (Enterprise)
- Reachability-aware score adjustment
- Gate-based risk modification
### 13.7 Unknowns Pressure Factor (Enterprise)
- Uncertainty budget enforcement
- Unknown count impact on risk
### 13.8 Custom Scoring Profiles (Enterprise)
- Organization-specific scoring
- Factor weight customization
- Profile versioning
### 13.9 Score Explanation Arrays
- Per-finding score breakdown
- Factor contribution transparency
- Decision audit support
---
## 14. Evidence Management
### 14.1 Findings List
- Comprehensive finding catalog
- Filtering and sorting
- Export capabilities
### 14.2 Evidence Graph View
- Visual evidence relationships
- Interactive exploration
- Dependency visualization
### 14.3 Findings Ledger (Enterprise)
- Immutable finding history
- Audit trail for all findings
- Finding lifecycle tracking
### 14.4 Evidence Locker (Enterprise)
- Sealed evidence storage
- Tamper-evident packaging
- Import/export capabilities
### 14.5 Evidence TTL Policies (Enterprise)
- Configurable retention rules
- Automatic expiration
- Compliance-driven retention
### 14.6 Evidence Size Budgets (Enterprise)
- Storage governance
- Quota enforcement
- Capacity planning
### 14.7 Retention Tiers (Enterprise)
- Hot tier (immediate access)
- Warm tier (near-line storage)
- Cold tier (archive storage)
### 14.8 Privacy Controls (Enterprise)
- Sensitive data redaction
- PII handling
- Anonymization support
### 14.9 Audit Pack Export (Enterprise)
- Compliance bundle generation
- Regulatory export formats
- Complete evidence packaging
---
## 15. Determinism & Reproducibility
### 15.1 Canonical JSON Serialization
- RFC 8785 compliant serialization
- Sorted keys
- Minimal escaping
- Consistent number formatting
### 15.2 Content-Addressed IDs
- SHA-256 based identification
- Immutable references
- Deduplication support
### 15.3 Replay Manifest (SRM)
- Complete scan input capture
- Version pinning
- Configuration recording
### 15.4 Replay Verification
- `stella replay` CLI command
- Digest assertion
- Bit-for-bit comparison
### 15.5 Evidence Freshness Multipliers (Community/Enterprise)
- Age-based confidence adjustment
- Decay algorithms
- Freshness enforcement
### 15.6 Proof Coverage Metrics (Community/Enterprise)
- Evidence completeness measurement
- Gap identification
- Coverage reporting
### 15.7 Fidelity Metrics (Enterprise)
- **BF** (Base Fidelity): Input quality
- **SF** (Scan Fidelity): Detection quality
- **PF** (Proof Fidelity): Evidence quality
- Audit dashboard integration
### 15.8 FN-Drift Rate Tracking (Enterprise)
- False negative monitoring
- Quality trend analysis
- Alert thresholds
### 15.9 Determinism Gate CI (Enterprise)
- Automated determinism testing
- CI/CD integration
- Drift prevention
---
## 16. CLI Features
### 16.1 Core Commands
- `stella scan` - Container image scanning
- `stella sbom` - SBOM generation and inspection
- `stella vex` - VEX evaluation and generation
- `stella advisory` - Advisory management
- `stella policy` - Policy evaluation
- `stella replay` - Deterministic replay
### 16.2 SBOM Commands
- `stella sbom generate` - Generate SBOM from image
- `stella sbom inspect` - View SBOM contents
- `stella sbom diff` - Compare SBOMs
- `stella sbom validate` - Validate SBOM format
- `stella sbom convert` - Convert between formats
### 16.3 VEX Commands
- `stella vex evaluate` - Evaluate VEX statements
- `stella vex generate` - Generate VEX documents
- `stella vex import` - Import VEX from file
- `stella vex export` - Export VEX statements
### 16.4 Attestation Commands
- `stella attest sign` - Sign attestations
- `stella attest verify` (Community/Enterprise) - Verify attestations
- `stella attest export` - Export attestations
### 16.5 Reachability Commands
- `stella reachability analyze` - Run reachability analysis
- `stella graph show` - Display reachability graph
- `stella reachability export` - Export reachability data
### 16.6 Risk Commands
- `stella risk evaluate` - Calculate risk scores
- `stella risk report` - Generate risk reports
### 16.7 Policy Commands
- `stella policy evaluate` - Run policy evaluation
- `stella policy validate` - Validate policy files
- `stella policy export` - Export policy decisions
### 16.8 Offline Commands
- `stella rootpack import` - Import trust root bundles
- `stella offline sync` - Sync offline data
- `stella offline verify` - Verify offline package
### 16.9 Database Commands
- `stella db update` - Update vulnerability database
- `stella db status` - Check database status
- `stella db export` - Export database snapshot
### 16.10 Export Commands
- `stella export sarif` - Export SARIF format
- `stella export json` - Export JSON format
- `stella export csv` - Export CSV format
- `stella export audit-pack` (Enterprise) - Export audit bundle
### 16.11 Administrative Commands (Enterprise)
- `stella admin` - Administrative utilities
- `stella symbols` - Symbol resolution commands
- `stella notify` - Notification management
- `stella orchestrator` - Workflow control
### 16.12 CLI Technical Features
- Native AOT compilation
- Cross-platform support (linux-x64, linux-arm64, osx-x64, osx-arm64, win-x64)
- Machine-readable output (JSON, NDJSON)
- Exit codes for CI/CD integration
- Environment variable configuration
---
## 17. Web UI Features
### 17.1 Core Interface
- Dark/Light mode toggle
- Responsive design
- Locale support (Cyrillic, etc.) (Community/Enterprise)
- Keyboard shortcuts (Enterprise)
### 17.2 Findings View
- Findings Row Component
- Filtering and sorting
- Bulk actions
- Export capabilities
### 17.3 Evidence Visualization
- Evidence Drawer panel
- Proof Tab for attestations
- Evidence Graph View
- Confidence Meter
### 17.4 VEX Interface
- VEX Conflict Studio UI
- Claim Comparison Table (Enterprise)
- Trust Algebra Panel (Enterprise)
### 17.5 Reachability Visualization
- Reachability Mini-Map (Enterprise)
- Path visualization
- Call graph explorer
### 17.6 Policy Interface
- Policy Chips Display (Enterprise)
- Gate status visualization
- Policy decision trace
### 17.7 Triage Features
- Triage Canvas component
- Vulnerability triage workflow
- Status management
- Assignment capabilities
### 17.8 Timeline Features (Enterprise)
- Runtime Timeline view
- Historical execution data
- Temporal analysis
### 17.9 Administrative Features (Enterprise)
- Audit Trail UI
- Knowledge Snapshot UI (air-gap prep)
- Operator/Auditor Toggle (role separation)
- Reproduce Verdict Button
### 17.10 Noise Gating UI
- Delta visualization
- Gating statistics
- Noise reduction controls
---
## 18. Offline & Air-Gap Operations
### 18.1 Offline Update Kits (OUK)
- Complete feed bundles
- Monthly (Community) / Weekly (Enterprise) updates
- Signed packages
### 18.2 Knowledge Snapshots (Enterprise)
- Sealed feed exports
- Complete knowledge state capture
- Merkle root verification
### 18.3 Offline Signature Verification (Community/Enterprise)
- Local verification without network
- Embedded revocation lists
- Cached trust roots
### 18.4 Offline JWT Tokens (Enterprise)
- 90-day offline tokens
- Local token validation
- Extended offline operation
### 18.5 Air-Gap Bundle Manifest (Enterprise)
- Transfer package specification
- Integrity verification
- Import/export workflows
### 18.6 No-Egress Enforcement (Enterprise)
- Strict network isolation
- Egress policy enforcement
- Connectivity validation
### 18.7 Offline Components
- Mirrored vulnerability feeds
- Local transparency log mirror
- RootPack trust bundles
- Embedded revocation lists
### 18.8 One-Command Replay (Community/Enterprise)
- `stella replay srm.yaml` for offline verification
- No network required for replay
- Complete evidence bundle
---
## 19. Deployment Options
### 19.1 Docker Compose
- Single-node deployment (all tiers)
- Development environment setup
- Quick start configuration
### 19.2 Helm Chart (Community/Enterprise)
- Kubernetes deployment
- Configurable replicas
- Resource management
- Secret management
### 19.3 High Availability (Enterprise)
- Multi-replica deployment
- Load balancing
- Failover support
- Disaster recovery
### 19.4 Horizontal Scaling (Enterprise)
- Auto-scaling support
- Workload distribution
- Resource optimization
### 19.5 Dedicated Capacity (Enterprise)
- Reserved resources
- Guaranteed performance
- Isolation options
### 19.6 Infrastructure Requirements
- **PostgreSQL 16+**: Primary database
- **Valkey 8.0+**: Caching and queuing
- **RustFS (S3)** (Community/Enterprise): Object storage
### 19.7 Container Images
- Multi-architecture support (amd64, arm64)
- Minimal base images
- Regular security updates
---
## 20. Authentication & Authorization
### 20.1 Authentication Methods
- **Basic Auth**: Username/password (all tiers)
- **API Keys**: Token-based access (all tiers)
- **SSO/SAML**: Okta, Azure AD integration (all tiers)
- **OIDC Support**: OpenID Connect with discovery (all tiers)
### 20.2 OAuth 2.0 Grant Types
- **Client Credentials**: Service-to-service authentication
- **Resource Owner Password Credentials**: User login
- **Authorization Code + PKCE**: Browser-based UI flows
- **Device Code**: CLI login on headless agents
- **Refresh Token Grant**: DPoP-bound or mTLS constrained
### 20.3 Sender-Constraint Technologies
#### DPoP (Demonstration of Proof-of-Possession)
- Proof JWT on every HTTP request
- Token bound via `cnf.jkt` (JWK thumbprint)
- Replay prevention with JTI cache
- Nonce support for high-value services
#### mTLS (Mutual TLS Binding)
- Client certificate-bound tokens
- Token carries `cnf.x5t#S256` (cert thumbprint)
- Enforced for high-value audiences (Signer, Attestor)
- Certificate chain validation
### 20.4 Token Management
- **Access Token (OpTok)**: 120-300 second TTL
- **Refresh Tokens**: Optional, short-lived (≤ 8h), rotating
- Token refresh (12h Free / 30d Community / Annual Enterprise)
- Short-lived key support
- JWT format with custom claims
### 20.5 Identity Provider Plugins
- **Standard Plugin**: Local username/password, MFA support
- **LDAP Plugin**: Active Directory / OpenLDAP integration
- **OIDC Plugin**: External OIDC provider federation
- **SAML Plugin**: SAML 2.0 assertion processing
### 20.6 RBAC (Role-Based Access Control)
- **Basic RBAC**: User/Admin roles (all tiers)
- **Advanced RBAC** (Enterprise): Team-based scopes, custom roles
- 70+ granular permission scopes
- Scope-based authorization enforcement
### 20.7 Scope Categories
- **Authority Admin**: `authority:tenants.*`, `authority:users.*`, `authority:roles.*`
- **Scanner**: `scanner:read`, `scanner:scan`, `scanner:export`
- **Signer**: `signer:read`, `signer:sign`, `signer:rotate`
- **Policy**: `policy:write`, `policy:review`, `policy:approve`, `policy:publish`
- **VulnExplorer**: `vuln:view`, `vuln:investigate`, `vuln:operate`
- **VEX**: `vex:read`, `vex:ingest`
- **Graph**: `graph:read`, `graph:write`, `graph:export`
- **Evidence**: `evidence:create`, `evidence:read`, `evidence:hold`
- **Attestation**: `attest:read`, `attest:create`, `attest:admin`
- **Observability**: `obs:read`, `obs:incident`, `timeline:read`
### 20.8 ABAC (Attribute-Based Access Control)
- Environment attribute filtering (`stellaops:attr:env`)
- Ownership visibility (`stellaops:attr:owner`)
- Business tier filtering (`stellaops:attr:business_tier`)
### 20.9 Multi-Tenant Management (Enterprise)
- Organization hierarchy
- Tenant isolation via `tid` claim
- Installation isolation via `inst` claim
- Cross-tenant policy enforcement
### 20.10 Specialized Tokens
- **Incident Mode Tokens**: 5-minute freshness, requires human reason
- **Vulnerability Workflow Tokens**: Anti-forgery for mutations
- **Attachment Access Tokens**: Evidence bundle downloads
- **Acknowledgment Tokens**: Notification workflows
### 20.11 Security Features
- Password lockout with configurable attempts
- Key rotation (30-90 day cadence, zero-downtime)
- KMS/HSM support (private keys never leave)
- Rate limiting (per-client, per-IP, per-endpoint)
- PKCE required for Authorization Code flow
### 20.12 Audit Logging (Enterprise)
- Token issuance audit (sub, aud, scopes, tid, jti)
- Revocation events
- Admin changes (client/user/role)
- Credential attempt tracking with failure codes
- DPoP/mTLS validation events
- SIEM integration
- User activity tracking
---
## 21. Integrations & Notifications
### 21.1 Notification Channels
- **In-App Notifications** (all tiers)
- **Email Notifications** (Community/Enterprise)
- **Slack Integration** (all tiers)
- **Microsoft Teams Integration** (all tiers)
### 21.2 Alert Types
- New vulnerability alerts
- EPSS change alerts (Community/Enterprise)
- Policy violation alerts
- Scan completion notifications
### 21.3 Registry Integration
- **Zastava Registry Hooks**: Auto-scan on container push (all tiers)
- Registry webhook observer
- Event-driven scanning
### 21.4 CI/CD Integration (Enterprise)
- GitLab CI/CD gates
- GitHub Actions integration
- Jenkins plugin
- Custom webhook endpoints
### 21.5 Custom Webhooks (Enterprise)
- Configurable endpoints
- Event filtering
- Payload customization
### 21.6 Enterprise Connectors (Enterprise)
- Grid/Premium API access
- Custom connector development
- Third-party integration support
### 21.7 Gateway & Router
- API gateway with routing
- Transport abstraction (TCP/TLS/UDP/RabbitMQ/Valkey)
- Rate limiting
- Request routing
---
## 22. Observability & Telemetry
### 22.1 Metrics
- Basic metrics (all tiers)
- Scan performance metrics
- Resource utilization metrics
- Error rate tracking
### 22.2 OpenTelemetry (Enterprise)
- Full distributed tracing
- Trace context propagation
- Custom span attributes
### 22.3 Prometheus Export (Enterprise)
- Prometheus metric format
- Custom metrics endpoints
- Grafana dashboard support
### 22.4 Telemetry Options
- Opt-in telemetry (all tiers)
- Telemetry configuration
- Privacy controls
### 22.5 Quality KPIs Dashboard (Enterprise)
- Triage metrics
- Detection accuracy
- Coverage statistics
### 22.6 SLA Monitoring (Enterprise)
- Uptime tracking
- Performance monitoring
- SLA compliance reporting
### 22.7 Logging
- Structured logging
- Log levels configuration
- Log aggregation support
---
## 23. Scheduling & Automation
### 23.1 Manual Scans
- On-demand scanning (all tiers)
- CLI-triggered scans
- UI-initiated scans
### 23.2 Scheduled Scans (Enterprise)
- Cron-based scheduling
- Recurring scan configuration
- Schedule management
### 23.3 Event-Driven Scanning (Enterprise)
- Registry push triggers
- Webhook-initiated scans
- Pipeline integration
### 23.4 Task Pack Orchestration (Enterprise)
- Declarative workflow definition
- Task pack execution
- Plan-hash binding
- Approval gates
- Sealed mode for air-gap
### 23.5 EPSS Daily Refresh (Enterprise)
- Automatic EPSS updates
- Score recalculation
- Delta notifications
### 23.6 Scheduler Features
- Job queue management
- Priority scheduling
- Resource allocation
- Failure retry policies
### 23.7 Orchestrator Features
- Workflow coordination
- Task dependency management
- Parallel execution
- Status tracking
---
## 24. Version Comparison
### 24.1 Package Version Formats
- **RPM (NEVRA)**: Name-Epoch-Version-Release-Architecture
- **Debian (EVR)**: Epoch-Version-Release
- **Alpine (APK)**: Alpine package versioning
- **SemVer**: Semantic versioning (major.minor.patch)
### 24.2 PURL Resolution
- Package URL parsing
- Ecosystem-aware resolution
- Version normalization
### 24.3 Version Range Matching
- Affected version range detection
- Fixed version identification
- Upgrade path calculation
---
## 25. Database & Storage
### 25.1 PostgreSQL Features
- PostgreSQL 16+ support
- Per-module schema isolation
- Row-Level Security (RLS) for multi-tenancy
- Connection pooling
### 25.2 Valkey/Redis Features
- Valkey 8.0+ support
- Caching layer
- Job queue backend
- Session storage
### 25.3 Object Storage (RustFS/S3)
- S3-compatible storage (Community/Enterprise)
- Content-addressed blob storage
- SBOM/evidence storage
- Artifact storage
### 25.4 Storage Features
- Content deduplication
- Compression support
- Encryption at rest
- Retention policies
---
## 26. API Capabilities
### 26.1 REST API
- RESTful endpoints
- OpenAPI 3.0 specification
- JSON request/response
- Pagination support
### 26.2 API Features
- Rate limiting (all tiers)
- 429 Backpressure handling
- Retry-After headers
- Priority queue (Enterprise)
- Burst allowance (Enterprise)
### 26.3 Quota Management
- Usage API (`/quota`)
- Scan quota tracking
- Quota enforcement
- Custom quotas (Enterprise)
### 26.4 API Authentication
- API key authentication
- JWT bearer tokens
- OAuth 2.0 support
- DPoP support
---
## 27. Support & Services
### 27.1 Documentation
- Comprehensive documentation (all tiers)
- API reference
- Architecture guides
- Tutorials and guides
### 27.2 Community Support
- Community forums (all tiers)
- GitHub Issues (all tiers)
- Documentation wiki
### 27.3 Email Support (Enterprise)
- Business hours support
- Ticket-based support
### 27.4 Priority Support (Enterprise)
- 4-hour response time
- Priority ticket handling
### 27.5 24/7 Critical Support (Enterprise)
- Round-the-clock support (add-on)
- Emergency response
### 27.6 Dedicated CSM (Enterprise)
- Named customer success manager
- Regular check-ins
- Account management
### 27.7 Professional Services (Enterprise)
- Implementation assistance
- Custom development
- Architecture review
### 27.8 Training & Certification (Enterprise)
- Team enablement
- Certification programs
- Custom training
### 27.9 SLA Guarantee (Enterprise)
- 99.9% uptime guarantee
- SLA credits
- Performance guarantees
---
## Appendix A: Module Reference
| Module | Description |
|--------|-------------|
| **Authority** | Authentication, authorization, OAuth/OIDC, DPoP |
| **Gateway** | API gateway with routing and transport abstraction |
| **Router** | Transport-agnostic messaging |
| **Concelier** | Vulnerability advisory ingestion and merge engine |
| **Excititor** | VEX document ingestion and export |
| **VexLens** | VEX consensus computation across issuers |
| **VexHub** | VEX distribution and exchange hub |
| **IssuerDirectory** | Issuer trust registry |
| **Feedser** | Evidence collection for backport detection |
| **Mirror** | Vulnerability feed mirror and distribution |
| **Scanner** | Container scanning with SBOM generation |
| **BinaryIndex** | Binary identity extraction and fingerprinting |
| **AdvisoryAI** | AI-assisted advisory analysis |
| **ReachGraph** | Reachability graph service |
| **Symbols** | Symbol resolution and debug information |
| **Attestor** | in-toto/DSSE attestation generation |
| **Signer** | Cryptographic signing operations |
| **SbomService** | SBOM storage, versioning, and lineage ledger |
| **EvidenceLocker** | Sealed evidence storage and export |
| **ExportCenter** | Batch export and report generation |
| **Provenance** | SLSA/DSSE attestation tooling |
| **Policy** | Policy engine with K4 lattice logic |
| **RiskEngine** | Risk scoring runtime |
| **VulnExplorer** | Vulnerability exploration and triage UI backend |
| **Unknowns** | Unknown component and symbol tracking |
| **Scheduler** | Job scheduling and queue management |
| **Orchestrator** | Workflow orchestration and task coordination |
| **TaskRunner** | Task pack execution engine |
| **Notify** | Notification toolkit |
| **Notifier** | Notifications Studio host |
| **PacksRegistry** | Task packs registry and distribution |
| **TimelineIndexer** | Timeline event indexing |
| **Replay** | Deterministic replay engine |
| **CLI** | Command-line interface |
| **Zastava** | Container registry webhook observer |
| **Web** | Angular frontend SPA |
| **Cryptography** | Crypto plugins (FIPS, eIDAS, GOST, SM, PQ) |
| **Telemetry** | OpenTelemetry traces, metrics, logging |
| **Graph** | Call graph and reachability data structures |
| **Signals** | Runtime signal collection and correlation |
| **AirGap** | Air-gapped deployment support |
| **AOC** | Append-Only Contract enforcement |
---
## Appendix B: Supported Standards
| Standard | Version | Usage |
|----------|---------|-------|
| CycloneDX | 1.7 | Primary SBOM format |
| SPDX | 3.0.1 | SBOM format |
| in-toto | Statement v1 | Attestation format |
| DSSE | v1 | Envelope signing |
| OpenVEX | Current spec | VEX format |
| SARIF | 2.1.0 | Findings interchange |
| Sigstore Rekor | API stable | Transparency logging |
| SLSA | v1.0 | Provenance attestation |
---
## Appendix C: Glossary
| Term | Definition |
|------|------------|
| **SBOM** | Software Bill of Materials - component inventory |
| **VEX** | Vulnerability Exploitability eXchange - exploitability status |
| **DSSE** | Dead Simple Signing Envelope - detached signatures |
| **in-toto** | Software supply chain attestation framework |
| **K4 Lattice** | Belnap four-valued logic (Unknown, True, False, Conflict) |
| **SRM** | Scan Replay Manifest - deterministic replay bundle |
| **PURL** | Package URL - universal package identifier |
| **NEVRA** | Name-Epoch-Version-Release-Architecture (RPM) |
| **EVR** | Epoch-Version-Release (Debian) |
| **KEV** | Known Exploited Vulnerabilities |
| **EPSS** | Exploit Prediction Scoring System |
| **OVAL** | Open Vulnerability and Assessment Language |
---
*Last updated: 4 Jan 2026*
*For tier availability, see [`04_FEATURE_MATRIX.md`](04_FEATURE_MATRIX.md)*