autoremediator 0.11.0 → 0.13.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +64 -76
- package/dist/{chunk-GYCZ6L3O.js → chunk-4CVVRAQM.js} +1167 -155
- package/dist/chunk-4CVVRAQM.js.map +1 -0
- package/dist/cli.js +217 -18
- package/dist/cli.js.map +1 -1
- package/dist/index.d.ts +163 -9
- package/dist/index.js +1091 -79
- package/dist/index.js.map +1 -1
- package/dist/mcp/server.js +51 -2
- package/dist/mcp/server.js.map +1 -1
- package/dist/openapi/server.js +88 -5
- package/dist/openapi/server.js.map +1 -1
- package/llms.txt +29 -4
- package/package.json +22 -25
- package/dist/chunk-GYCZ6L3O.js.map +0 -1
package/README.md
CHANGED
|
@@ -8,117 +8,105 @@
|
|
|
8
8
|
[](https://github.com/marketplace/actions/autoremediator)
|
|
9
9
|
|
|
10
10
|
> [!WARNING]
|
|
11
|
-
> Automated dependency remediation
|
|
12
|
-
>
|
|
13
|
-
> Autoremediator is designed for risk-aware automation teams, and should be paired with explicit policy, CI safeguards, and repository protection rules.
|
|
11
|
+
> Automated dependency remediation carries operational and supply-chain risk if deployed without policy controls.
|
|
12
|
+
> Autoremediator is designed for risk-aware security and platform teams, and should be paired with explicit remediation policy, CI validation gates, and repository protection rules.
|
|
14
13
|
|
|
15
14
|
Autoremediator is an agentic CVE remediation platform for Node.js.
|
|
16
15
|
|
|
17
|
-
It
|
|
16
|
+
It closes the gap between vulnerability detection and remediation by correlating threat intelligence, measuring exploitability, and executing policy-governed fixes — across single repositories, large service portfolios, and agent-driven workflows.
|
|
18
17
|
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
The outcome is faster containment of dependency exposure, stronger remediation posture, and cleaner telemetry across CI/CD, platform automation, and agent-driven workflows.
|
|
18
|
+
The outcome is reduced mean time to remediation (MTTR), narrower exposure windows, and auditable remediation posture across your dependency estate.
|
|
22
19
|
|
|
23
20
|
See the [documentation](https://rawlings.github.io/autoremediator/docs/getting-started) to get started.
|
|
24
21
|
|
|
25
|
-
##
|
|
26
|
-
|
|
27
|
-
Autoremediator operates as a remediation control plane, not a scanner wrapper.
|
|
22
|
+
## A remediation control plane, not a scanner
|
|
28
23
|
|
|
29
|
-
|
|
24
|
+
Most SCA tools stop at detection. Autoremediator starts there.
|
|
30
25
|
|
|
31
|
-
|
|
26
|
+
It ingests vulnerability findings from scanners or accepts a CVE ID directly, then drives each finding through a multi-strategy remediation pipeline: safe version upgrade, transitive dependency override, and controlled patch generation with confidence scoring as a last resort. Every path is gated by policy, validated before it is applied, and backed by structured evidence for downstream traceability.
|
|
32
27
|
|
|
33
|
-
|
|
28
|
+
The result is a closed-loop remediation workflow rather than an ever-growing triage backlog.
|
|
34
29
|
|
|
35
|
-
##
|
|
30
|
+
## Exploitability-informed prioritization
|
|
36
31
|
|
|
37
|
-
|
|
38
|
-
- Deterministic remediation orchestration with explicit safety and failure semantics
|
|
39
|
-
- Multi-strategy execution across direct bumps, transitive overrides, and controlled patch fallback
|
|
40
|
-
- Portfolio-scale coverage across large Node.js repository estates
|
|
41
|
-
- AI ecosystem interoperability through MCP, OpenAPI, SDK, CLI, and agent runtime surfaces
|
|
42
|
-
- Structured evidence, rollups, outcome taxonomy, and agent-consumable telemetry for governance and security analytics
|
|
32
|
+
Severity scores alone are poor remediation signals. Autoremediator enriches each CVE with corroborating signals before any fix is attempted:
|
|
43
33
|
|
|
44
|
-
|
|
34
|
+
- **CISA KEV** — confirms whether a vulnerability is actively exploited in the wild
|
|
35
|
+
- **EPSS** — quantifies exploit probability as a continuous percentile score
|
|
36
|
+
- **Advisory consensus** — cross-references OSV, GitHub Advisory Database, and NVD to validate affected ranges and fixed versions
|
|
45
37
|
|
|
46
|
-
|
|
38
|
+
This enrichment drives prioritization and disposition decisions, so high-risk, actively exploited vulnerabilities are handled with higher urgency than theoretical severities would suggest.
|
|
47
39
|
|
|
48
|
-
|
|
49
|
-
2. inspect installed dependency inventory
|
|
50
|
-
3. match vulnerable installed versions
|
|
51
|
-
4. attempt safe direct dependency version bump
|
|
52
|
-
5. if transitive, attempt package-manager-native override or resolution
|
|
53
|
-
6. if still unresolved, attempt controlled patch fallback and emit patch artifacts
|
|
40
|
+
## Multi-strategy remediation
|
|
54
41
|
|
|
55
|
-
|
|
42
|
+
Autoremediator selects the safest applicable fix strategy for each vulnerability:
|
|
56
43
|
|
|
57
|
-
|
|
44
|
+
- **Direct version upgrade** — the preferred path when a safe fixed version exists in the direct dependency graph
|
|
45
|
+
- **Transitive override** — applied when exposure is in a transitive dependency and a direct upgrade is not feasible
|
|
46
|
+
- **Controlled patch generation** — a confidence-scored fallback when no safe fixed version exists; produces auditable patch artifacts tracked through their full lifecycle
|
|
58
47
|
|
|
59
|
-
|
|
48
|
+
Unresolved findings are never silently dropped. Each one is classified with an explicit reason and treated as an escalation input for downstream security workflows.
|
|
60
49
|
|
|
61
|
-
|
|
50
|
+
## Policy-governed automation
|
|
62
51
|
|
|
63
|
-
|
|
64
|
-
- [GitHub Advisory Database](https://github.com/advisories): package advisories and ecosystem metadata
|
|
65
|
-
- [NVD](https://nvd.nist.gov): severity context and CVE reference data
|
|
52
|
+
Autoremediator is designed to operate autonomously without sacrificing control. Remediation behavior is governed by a policy layer that determines disposition for every finding:
|
|
66
53
|
|
|
67
|
-
|
|
68
|
-
|
|
69
|
-
-
|
|
70
|
-
-
|
|
71
|
-
- [CVE Services](https://www.cve.org/): additional CVE references and descriptions
|
|
72
|
-
- [GitLab Advisory Database](https://advisories.gitlab.com): supplemental advisory matching
|
|
73
|
-
- [CERT/CC Vulnerability Notes](https://www.kb.cert.org/vuls/): analyst context for selected CVEs
|
|
74
|
-
- [deps.dev](https://deps.dev): package metadata coverage checks
|
|
75
|
-
- [OpenSSF Scorecard](https://securityscorecards.dev): package trust and repository posture signals
|
|
76
|
-
- Optional vendor and commercial feeds via environment-configured connectors
|
|
54
|
+
- **Auto-apply** for high-confidence remediations within acceptable risk thresholds
|
|
55
|
+
- **Simulation** for preview and dry-run validation before mutations are committed
|
|
56
|
+
- **Hold for approval** when human review is warranted before applying a fix
|
|
57
|
+
- **Escalation** for findings that exceed risk tolerance, with configurable follow-on actions such as issue creation, channel notification, or draft PR
|
|
77
58
|
|
|
78
|
-
|
|
59
|
+
Portfolio-scale campaigns apply risk ranking to prioritize remediation order across large target sets.
|
|
79
60
|
|
|
80
|
-
|
|
81
|
-
- Preserve evidence so remediation decisions remain auditable
|
|
82
|
-
- Enforce policy and validation gates before outcomes are marked resolved
|
|
83
|
-
- Treat low-confidence or unresolved outcomes as explicit escalation inputs
|
|
61
|
+
## Vulnerability intelligence sources
|
|
84
62
|
|
|
85
|
-
|
|
63
|
+
Primary advisory sources:
|
|
86
64
|
|
|
87
|
-
-
|
|
88
|
-
-
|
|
89
|
-
-
|
|
90
|
-
- OpenAPI server: service-based integration and centralized remediation operations
|
|
91
|
-
- VS Code extension: Node CVE Remediator for editor-side scanning and fix actions
|
|
92
|
-
|
|
93
|
-
Patch lifecycle operations are exposed consistently:
|
|
94
|
-
|
|
95
|
-
- CLI: `autoremediator patches list`, `autoremediator patches inspect`, `autoremediator patches validate`
|
|
96
|
-
- SDK: `listPatchArtifacts`, `inspectPatchArtifact`, `validatePatchArtifact`
|
|
97
|
-
- MCP and OpenAPI: equivalent patch lifecycle operations
|
|
65
|
+
- [OSV](https://osv.dev): ecosystem-first vulnerability records and affected or fixed ranges
|
|
66
|
+
- [GitHub Advisory Database](https://github.com/advisories): package advisories and ecosystem metadata
|
|
67
|
+
- [NVD](https://nvd.nist.gov): CVE reference data and severity context
|
|
98
68
|
|
|
99
|
-
|
|
69
|
+
Exploitability and trust enrichment:
|
|
100
70
|
|
|
101
|
-
|
|
71
|
+
- [CISA KEV](https://www.cisa.gov/known-exploited-vulnerabilities-catalog): active exploitation signals
|
|
72
|
+
- [FIRST EPSS](https://www.first.org/epss/): exploit probability scoring
|
|
73
|
+
- [CVE Services](https://www.cve.org/): authoritative CVE references
|
|
74
|
+
- [GitLab Advisory Database](https://advisories.gitlab.com): supplemental advisory coverage
|
|
75
|
+
- [CERT/CC Vulnerability Notes](https://www.kb.cert.org/vuls/): analyst context for selected CVEs
|
|
76
|
+
- [deps.dev](https://deps.dev): package metadata and dependency graph coverage
|
|
77
|
+
- [OpenSSF Scorecard](https://securityscorecards.dev): repository and package trust posture
|
|
78
|
+
- Optional vendor and commercial feeds via environment-configured connectors
|
|
102
79
|
|
|
103
|
-
|
|
80
|
+
## Integration surfaces
|
|
104
81
|
|
|
105
|
-
|
|
106
|
-
2. apply `remediate` after policy and approval checks
|
|
107
|
-
3. inspect and validate patch artifacts when fallback patching occurs
|
|
82
|
+
Autoremediator is designed to meet security operations where they already run:
|
|
108
83
|
|
|
109
|
-
|
|
84
|
+
- **CLI** — direct invocation in developer workflows and CI/CD pipeline jobs
|
|
85
|
+
- **SDK** — programmatic integration for platforms, internal tooling, and security automation
|
|
86
|
+
- **GitHub Actions** — reusable workflow and Marketplace action for scan-to-remediation CI pipelines
|
|
87
|
+
- **MCP server** — native tool integration for AI agents, LLM orchestrators, and copilot surfaces
|
|
88
|
+
- **OpenAPI server** — HTTP-accessible remediation endpoint for centralized or service-based deployments
|
|
89
|
+
- **VS Code extension** — editor-side vulnerability scanning and fix actions
|
|
110
90
|
|
|
111
|
-
|
|
91
|
+
```yaml
|
|
92
|
+
jobs:
|
|
93
|
+
gate:
|
|
94
|
+
uses: rawlings/autoremediator/.github/workflows/reusable-remediate-from-audit.yml@v1
|
|
95
|
+
with:
|
|
96
|
+
audit: true
|
|
97
|
+
dry-run: true
|
|
98
|
+
ci: true
|
|
99
|
+
```
|
|
112
100
|
|
|
113
|
-
|
|
101
|
+
For configuration reference, workflow variants, and MCP host setup, see the [Integrations](https://rawlings.github.io/autoremediator/docs/integrations) and [Agent Ecosystems](https://rawlings.github.io/autoremediator/docs/agent-ecosystems) guides.
|
|
114
102
|
|
|
115
103
|
## Use cases
|
|
116
104
|
|
|
117
|
-
- Autonomous
|
|
118
|
-
-
|
|
119
|
-
- Scanner-to-remediation conversion for high-volume
|
|
120
|
-
- Embedded remediation for internal
|
|
121
|
-
-
|
|
105
|
+
- Autonomous vulnerability remediation in CI/CD pipelines with deterministic security gating
|
|
106
|
+
- Continuous exposure reduction across large Node.js service portfolios
|
|
107
|
+
- Scanner-to-remediation conversion for high-volume SCA findings
|
|
108
|
+
- Embedded remediation for internal security platforms, AI assistants, and SecOps tooling
|
|
109
|
+
- Policy-governed supply chain risk management at scale
|
|
122
110
|
|
|
123
111
|
## Documentation
|
|
124
112
|
|