autoremediator 0.11.0 → 0.13.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -8,117 +8,105 @@
8
8
  [![GitHub Actions](https://img.shields.io/badge/github--actions-marketplace-blue)](https://github.com/marketplace/actions/autoremediator)
9
9
 
10
10
  > [!WARNING]
11
- > Automated dependency remediation is a controversial practice.
12
- > It can reduce exposure windows, but it can also introduce operational and supply-chain risk if used without policy controls.
13
- > Autoremediator is designed for risk-aware automation teams, and should be paired with explicit policy, CI safeguards, and repository protection rules.
11
+ > Automated dependency remediation carries operational and supply-chain risk if deployed without policy controls.
12
+ > Autoremediator is designed for risk-aware security and platform teams, and should be paired with explicit remediation policy, CI validation gates, and repository protection rules.
14
13
 
15
14
  Autoremediator is an agentic CVE remediation platform for Node.js.
16
15
 
17
- It turns dependency security from fragmented backlog triage into an autonomous remediation pipeline with threat-intelligence correlation, exploitability-aware prioritization, deterministic execution, and machine-readable evidence.
16
+ It closes the gap between vulnerability detection and remediation by correlating threat intelligence, measuring exploitability, and executing policy-governed fixes — across single repositories, large service portfolios, and agent-driven workflows.
18
17
 
19
- It is built for AI-native software delivery, agentic security operations, and policy-governed software supply chain response.
20
-
21
- The outcome is faster containment of dependency exposure, stronger remediation posture, and cleaner telemetry across CI/CD, platform automation, and agent-driven workflows.
18
+ The outcome is reduced mean time to remediation (MTTR), narrower exposure windows, and auditable remediation posture across your dependency estate.
22
19
 
23
20
  See the [documentation](https://rawlings.github.io/autoremediator/docs/getting-started) to get started.
24
21
 
25
- ## Security remediation, closed loop
26
-
27
- Autoremediator operates as a remediation control plane, not a scanner wrapper.
22
+ ## A remediation control plane, not a scanner
28
23
 
29
- It correlates ecosystem advisory data, exploitability telemetry, and operational policy to drive remediation decisions across repositories, portfolios, service surfaces, and agentic execution paths.
24
+ Most SCA tools stop at detection. Autoremediator starts there.
30
25
 
31
- When a clean upgrade path exists, it executes a safe dependency bump. When exposure is transitive, it applies package-manager-native overrides and resolutions. When no safe fixed version exists, it escalates into controlled patch generation with confidence thresholds, validation gates, and artifact tracking.
26
+ It ingests vulnerability findings from scanners or accepts a CVE ID directly, then drives each finding through a multi-strategy remediation pipeline: safe version upgrade, transitive dependency override, and controlled patch generation with confidence scoring as a last resort. Every path is gated by policy, validated before it is applied, and backed by structured evidence for downstream traceability.
32
27
 
33
- Every remediation path is constrained by policy, dry-run controls, validation requirements, and auditable evidence artifacts so autonomous response stays governable, reviewable, and automation-safe.
28
+ The result is a closed-loop remediation workflow rather than an ever-growing triage backlog.
34
29
 
35
- ## What sets it apart
30
+ ## Exploitability-informed prioritization
36
31
 
37
- - Exploit-aware prioritization beyond severity-centric triage
38
- - Deterministic remediation orchestration with explicit safety and failure semantics
39
- - Multi-strategy execution across direct bumps, transitive overrides, and controlled patch fallback
40
- - Portfolio-scale coverage across large Node.js repository estates
41
- - AI ecosystem interoperability through MCP, OpenAPI, SDK, CLI, and agent runtime surfaces
42
- - Structured evidence, rollups, outcome taxonomy, and agent-consumable telemetry for governance and security analytics
32
+ Severity scores alone are poor remediation signals. Autoremediator enriches each CVE with corroborating signals before any fix is attempted:
43
33
 
44
- ## From signal to remediation
34
+ - **CISA KEV** confirms whether a vulnerability is actively exploited in the wild
35
+ - **EPSS** — quantifies exploit probability as a continuous percentile score
36
+ - **Advisory consensus** — cross-references OSV, GitHub Advisory Database, and NVD to validate affected ranges and fixed versions
45
37
 
46
- Canonical remediation flow:
38
+ This enrichment drives prioritization and disposition decisions, so high-risk, actively exploited vulnerabilities are handled with higher urgency than theoretical severities would suggest.
47
39
 
48
- 1. lookup CVE intelligence
49
- 2. inspect installed dependency inventory
50
- 3. match vulnerable installed versions
51
- 4. attempt safe direct dependency version bump
52
- 5. if transitive, attempt package-manager-native override or resolution
53
- 6. if still unresolved, attempt controlled patch fallback and emit patch artifacts
40
+ ## Multi-strategy remediation
54
41
 
55
- Outputs remain deterministic across interfaces, including `strategyCounts`, `dependencyScopeCounts`, and `unresolvedByReason`, so CI systems, workflow engines, autonomous agents, and orchestration runtimes can route outcomes without reparsing nested result trees.
42
+ Autoremediator selects the safest applicable fix strategy for each vulnerability:
56
43
 
57
- Patch artifacts are written to `patchesDir` with `.patch.json` manifests and can be listed, inspected, and validated in follow-on automation.
44
+ - **Direct version upgrade** the preferred path when a safe fixed version exists in the direct dependency graph
45
+ - **Transitive override** — applied when exposure is in a transitive dependency and a direct upgrade is not feasible
46
+ - **Controlled patch generation** — a confidence-scored fallback when no safe fixed version exists; produces auditable patch artifacts tracked through their full lifecycle
58
47
 
59
- ## Intelligence that drives action
48
+ Unresolved findings are never silently dropped. Each one is classified with an explicit reason and treated as an escalation input for downstream security workflows.
60
49
 
61
- Primary sources:
50
+ ## Policy-governed automation
62
51
 
63
- - [OSV](https://osv.dev): ecosystem-first vulnerability records and affected or fixed ranges
64
- - [GitHub Advisory Database](https://github.com/advisories): package advisories and ecosystem metadata
65
- - [NVD](https://nvd.nist.gov): severity context and CVE reference data
52
+ Autoremediator is designed to operate autonomously without sacrificing control. Remediation behavior is governed by a policy layer that determines disposition for every finding:
66
53
 
67
- Enrichment and prioritization sources:
68
-
69
- - [CISA KEV](https://www.cisa.gov/known-exploited-vulnerabilities-catalog): known-exploited vulnerability signal
70
- - [FIRST EPSS](https://www.first.org/epss/): exploit probability and percentile scoring
71
- - [CVE Services](https://www.cve.org/): additional CVE references and descriptions
72
- - [GitLab Advisory Database](https://advisories.gitlab.com): supplemental advisory matching
73
- - [CERT/CC Vulnerability Notes](https://www.kb.cert.org/vuls/): analyst context for selected CVEs
74
- - [deps.dev](https://deps.dev): package metadata coverage checks
75
- - [OpenSSF Scorecard](https://securityscorecards.dev): package trust and repository posture signals
76
- - Optional vendor and commercial feeds via environment-configured connectors
54
+ - **Auto-apply** for high-confidence remediations within acceptable risk thresholds
55
+ - **Simulation** for preview and dry-run validation before mutations are committed
56
+ - **Hold for approval** when human review is warranted before applying a fix
57
+ - **Escalation** for findings that exceed risk tolerance, with configurable follow-on actions such as issue creation, channel notification, or draft PR
77
58
 
78
- Trust model principles:
59
+ Portfolio-scale campaigns apply risk ranking to prioritize remediation order across large target sets.
79
60
 
80
- - Correlate across multiple advisory, exploitability, and trust sources
81
- - Preserve evidence so remediation decisions remain auditable
82
- - Enforce policy and validation gates before outcomes are marked resolved
83
- - Treat low-confidence or unresolved outcomes as explicit escalation inputs
61
+ ## Vulnerability intelligence sources
84
62
 
85
- ## Built for every surface
63
+ Primary advisory sources:
86
64
 
87
- - CLI: workflow jobs and CI runs
88
- - SDK: `remediate`, `planRemediation`, `remediateFromScan`, `updateOutdated`
89
- - MCP server: agent ecosystem integration, tool invocation, and LLM-orchestrated workflows
90
- - OpenAPI server: service-based integration and centralized remediation operations
91
- - VS Code extension: Node CVE Remediator for editor-side scanning and fix actions
92
-
93
- Patch lifecycle operations are exposed consistently:
94
-
95
- - CLI: `autoremediator patches list`, `autoremediator patches inspect`, `autoremediator patches validate`
96
- - SDK: `listPatchArtifacts`, `inspectPatchArtifact`, `validatePatchArtifact`
97
- - MCP and OpenAPI: equivalent patch lifecycle operations
65
+ - [OSV](https://osv.dev): ecosystem-first vulnerability records and affected or fixed ranges
66
+ - [GitHub Advisory Database](https://github.com/advisories): package advisories and ecosystem metadata
67
+ - [NVD](https://nvd.nist.gov): CVE reference data and severity context
98
68
 
99
- Non-security maintenance via `updateOutdated` (CLI: `autoremediator update-outdated`) bumps all outdated npm packages with policy controls, evidence, and optional PR creation — no CVE ID required.
69
+ Exploitability and trust enrichment:
100
70
 
101
- ## Designed for agentic workflows
71
+ - [CISA KEV](https://www.cisa.gov/known-exploited-vulnerabilities-catalog): active exploitation signals
72
+ - [FIRST EPSS](https://www.first.org/epss/): exploit probability scoring
73
+ - [CVE Services](https://www.cve.org/): authoritative CVE references
74
+ - [GitLab Advisory Database](https://advisories.gitlab.com): supplemental advisory coverage
75
+ - [CERT/CC Vulnerability Notes](https://www.kb.cert.org/vuls/): analyst context for selected CVEs
76
+ - [deps.dev](https://deps.dev): package metadata and dependency graph coverage
77
+ - [OpenSSF Scorecard](https://securityscorecards.dev): repository and package trust posture
78
+ - Optional vendor and commercial feeds via environment-configured connectors
102
79
 
103
- Recommended orchestration flow:
80
+ ## Integration surfaces
104
81
 
105
- 1. call `planRemediation` to generate a non-mutating plan
106
- 2. apply `remediate` after policy and approval checks
107
- 3. inspect and validate patch artifacts when fallback patching occurs
82
+ Autoremediator is designed to meet security operations where they already run:
108
83
 
109
- Public naming canon across surfaces: `runTests`, `policy`, `evidence`, `patchCount`, `patchesDir`.
84
+ - **CLI** direct invocation in developer workflows and CI/CD pipeline jobs
85
+ - **SDK** — programmatic integration for platforms, internal tooling, and security automation
86
+ - **GitHub Actions** — reusable workflow and Marketplace action for scan-to-remediation CI pipelines
87
+ - **MCP server** — native tool integration for AI agents, LLM orchestrators, and copilot surfaces
88
+ - **OpenAPI server** — HTTP-accessible remediation endpoint for centralized or service-based deployments
89
+ - **VS Code extension** — editor-side vulnerability scanning and fix actions
110
90
 
111
- Native change-request support includes GitHub and GitLab workflows, including grouped scan strategies, orchestration-friendly run metadata, and plan-first execution patterns for agentic systems.
91
+ ```yaml
92
+ jobs:
93
+ gate:
94
+ uses: rawlings/autoremediator/.github/workflows/reusable-remediate-from-audit.yml@v1
95
+ with:
96
+ audit: true
97
+ dry-run: true
98
+ ci: true
99
+ ```
112
100
 
113
- Packaging shortcut: `pnpm build:vsix` builds the publishable VSIX from the repository root.
101
+ For configuration reference, workflow variants, and MCP host setup, see the [Integrations](https://rawlings.github.io/autoremediator/docs/integrations) and [Agent Ecosystems](https://rawlings.github.io/autoremediator/docs/agent-ecosystems) guides.
114
102
 
115
103
  ## Use cases
116
104
 
117
- - Autonomous security automation in GitHub workflows and CI/CD pipelines
118
- - Deterministic CI gating for unresolved dependency exposure
119
- - Scanner-to-remediation conversion for high-volume vulnerability backlogs
120
- - Embedded remediation for internal AI assistants, copilots, bots, and security platforms
121
- - Portfolio-wide standardization across large Node.js service estates
105
+ - Autonomous vulnerability remediation in CI/CD pipelines with deterministic security gating
106
+ - Continuous exposure reduction across large Node.js service portfolios
107
+ - Scanner-to-remediation conversion for high-volume SCA findings
108
+ - Embedded remediation for internal security platforms, AI assistants, and SecOps tooling
109
+ - Policy-governed supply chain risk management at scale
122
110
 
123
111
  ## Documentation
124
112