autoremediator 0.7.0 → 0.9.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -2,7 +2,7 @@
2
2
 
3
3
  [![npm version](https://img.shields.io/npm/v/autoremediator.svg)](https://www.npmjs.com/package/autoremediator)
4
4
  [![npm downloads](https://img.shields.io/npm/dm/autoremediator.svg)](https://www.npmjs.com/package/autoremediator)
5
- [![license](https://img.shields.io/npm/l/autoremediator.svg)](https://github.com/Rawlings/autoremediator/blob/master/LICENSE)
5
+ [![license](https://img.shields.io/npm/l/autoremediator.svg)](LICENSE)
6
6
  [![node](https://img.shields.io/node/v/autoremediator.svg)](https://www.npmjs.com/package/autoremediator)
7
7
  [![Docker](https://img.shields.io/badge/docker-ghcr.io-blue)](https://github.com/Rawlings/autoremediator/pkgs/container/autoremediator)
8
8
  [![GitHub Actions](https://img.shields.io/badge/github--actions-marketplace-blue)](https://github.com/marketplace/actions/autoremediator)
@@ -12,106 +12,129 @@
12
12
  > It can reduce exposure windows, but it can also introduce operational and supply-chain risk if used without policy controls.
13
13
  > Autoremediator is designed for risk-aware automation teams, and should be paired with explicit policy, CI safeguards, and repository protection rules.
14
14
 
15
- Autoremediator is a risk-aware, agentic Node.js CVE remediation package.
15
+ Autoremediator is an agentic CVE remediation platform for Node.js.
16
16
 
17
- It correlates OSV package intelligence with CISA KEV known-exploited signals and FIRST EPSS exploit probability scores to prioritize vulnerabilities more likely to matter in production.
17
+ It turns dependency security from fragmented backlog triage into an autonomous remediation pipeline with threat-intelligence correlation, exploitability-aware prioritization, deterministic execution, and machine-readable evidence.
18
18
 
19
- This package is designed for teams that want remediation integrated into GitHub workflows and CI pipelines with policy and evidence controls.
19
+ It is built for AI-native software delivery, agentic security operations, and policy-governed software supply chain response.
20
20
 
21
- It exposes stable SDK and CLI surfaces for direct CVE remediation and scanner-driven automation.
22
-
23
- It also exposes non-mutating planning and correlation context for agent orchestration workflows.
21
+ The outcome is faster containment of dependency exposure, stronger remediation posture, and cleaner telemetry across CI/CD, platform automation, and agent-driven workflows.
24
22
 
25
23
  See the [documentation](https://rawlings.github.io/autoremediator/docs/getting-started) to get started.
26
24
 
27
- ## Why Teams Use It
25
+ ## Security remediation, closed loop
26
+
27
+ Autoremediator operates as a remediation control plane, not a scanner wrapper.
28
+
29
+ It correlates ecosystem advisory data, exploitability telemetry, and operational policy to drive remediation decisions across repositories, portfolios, service surfaces, and agentic execution paths.
30
+
31
+ When a clean upgrade path exists, it executes a safe dependency bump. When exposure is transitive, it applies package-manager-native overrides and resolutions. When no safe fixed version exists, it escalates into controlled patch generation with confidence thresholds, validation gates, and artifact tracking.
28
32
 
29
- - Continuous remediation in CI and scheduled GitHub workflows
30
- - Risk-aware prioritization using EPSS, CISA KEV, and OSV intelligence
31
- - Scanner-to-fix pipelines from npm audit, yarn audit, and SARIF inputs
32
- - Lower vulnerability fatigue by focusing operator attention on exploited and higher-probability issues
33
- - Policy-aware upgrade behavior for controlled automation at scale
34
- - Structured evidence and summary outputs for security operations
35
- - Multiple integration surfaces for platform engineering and automation agents
33
+ Every remediation path is constrained by policy, dry-run controls, validation requirements, and auditable evidence artifacts so autonomous response stays governable, reviewable, and automation-safe.
36
34
 
37
- ## Primary Use Cases
35
+ ## What sets it apart
38
36
 
39
- - Scheduled GitHub Actions remediation jobs with auto-generated pull requests
40
- - CI enforcement gates that fail on unresolved remediation outcomes
41
- - Scanner-to-fix automation from npm audit, yarn audit, and SARIF outputs
42
- - Platform-level remediation orchestration across many services
43
- - Agentic integration via CLI, SDK, MCP, and OpenAPI
37
+ - Exploit-aware prioritization beyond severity-centric triage
38
+ - Deterministic remediation orchestration with explicit safety and failure semantics
39
+ - Multi-strategy execution across direct bumps, transitive overrides, and controlled patch fallback
40
+ - Portfolio-scale coverage across large Node.js repository estates
41
+ - AI ecosystem interoperability through MCP, OpenAPI, SDK, CLI, and agent runtime surfaces
42
+ - Structured evidence, rollups, outcome taxonomy, and agent-consumable telemetry for governance and security analytics
44
43
 
45
- ## How Remediation Works
44
+ ## From signal to remediation
46
45
 
47
- Core pipeline behavior:
46
+ Canonical remediation flow:
48
47
 
49
- 1. CVE lookup and enrichment
50
- 2. installed dependency inventory detection
51
- 3. vulnerable version matching
52
- 4. safe version bump attempt
53
- 5. controlled fallback patch flow when no safe bump exists
48
+ 1. lookup CVE intelligence
49
+ 2. inspect installed dependency inventory
50
+ 3. match vulnerable installed versions
51
+ 4. attempt safe direct dependency version bump
52
+ 5. if transitive, attempt package-manager-native override or resolution
53
+ 6. if still unresolved, attempt controlled patch fallback and emit patch artifacts
54
54
 
55
- Safety and policy controls are applied through each stage.
55
+ Outputs remain deterministic across interfaces, including `strategyCounts`, `dependencyScopeCounts`, and `unresolvedByReason`, so CI systems, workflow engines, autonomous agents, and orchestration runtimes can route outcomes without reparsing nested result trees.
56
56
 
57
- ## Trust and Advisory Sources
57
+ Patch artifacts are written to `patchesDir` with `.patch.json` manifests and can be listed, inspected, and validated in follow-on automation.
58
58
 
59
- The remediation engine relies on public vulnerability intelligence sources and deterministic policy checks.
59
+ ## Intelligence that drives action
60
60
 
61
61
  Primary sources:
62
62
 
63
- - [OSV](https://osv.dev)
64
- - [GitHub Advisory Database](https://github.com/advisories)
65
- - [NVD](https://nvd.nist.gov)
63
+ - [OSV](https://osv.dev): ecosystem-first vulnerability records and affected or fixed ranges
64
+ - [GitHub Advisory Database](https://github.com/advisories): package advisories and ecosystem metadata
65
+ - [NVD](https://nvd.nist.gov): severity context and CVE reference data
66
66
 
67
- Supplemental enrichment and prioritization sources:
67
+ Enrichment and prioritization sources:
68
68
 
69
- - [CISA KEV](https://www.cisa.gov/known-exploited-vulnerabilities-catalog)
70
- - [FIRST EPSS](https://www.first.org/epss/)
71
- - [CVE Services](https://www.cve.org/)
72
- - [GitLab Advisory Database](https://advisories.gitlab.com)
73
- - [CERT/CC Vulnerability Notes](https://www.kb.cert.org/vuls/)
74
- - [deps.dev](https://deps.dev)
75
- - [OpenSSF Scorecard](https://securityscorecards.dev)
69
+ - [CISA KEV](https://www.cisa.gov/known-exploited-vulnerabilities-catalog): known-exploited vulnerability signal
70
+ - [FIRST EPSS](https://www.first.org/epss/): exploit probability and percentile scoring
71
+ - [CVE Services](https://www.cve.org/): additional CVE references and descriptions
72
+ - [GitLab Advisory Database](https://advisories.gitlab.com): supplemental advisory matching
73
+ - [CERT/CC Vulnerability Notes](https://www.kb.cert.org/vuls/): analyst context for selected CVEs
74
+ - [deps.dev](https://deps.dev): package metadata coverage checks
75
+ - [OpenSSF Scorecard](https://securityscorecards.dev): package trust and repository posture signals
76
76
  - Optional vendor and commercial feeds via environment-configured connectors
77
77
 
78
- Trust controls:
78
+ Trust model principles:
79
79
 
80
- - correlate advisory data with local dependency inventory before action
81
- - prefer safe version remediation when fixed versions are available
82
- - emit structured evidence so every remediation attempt is traceable
83
- - preserve unresolved status when confidence or validation gates fail
80
+ - Correlate across multiple advisory, exploitability, and trust sources
81
+ - Preserve evidence so remediation decisions remain auditable
82
+ - Enforce policy and validation gates before outcomes are marked resolved
83
+ - Treat low-confidence or unresolved outcomes as explicit escalation inputs
84
84
 
85
- ## Surfaces
85
+ ## Built for every surface
86
86
 
87
- - CLI: workflow and CI execution
88
- - SDK: custom automation programs (`remediate`, `planRemediation`, `remediateFromScan`)
89
- - MCP: AI host integrations
90
- - OpenAPI: service-based automation
87
+ - CLI: workflow jobs and CI runs
88
+ - SDK: `remediate`, `planRemediation`, `remediateFromScan`
89
+ - MCP server: agent ecosystem integration, tool invocation, and LLM-orchestrated workflows
90
+ - OpenAPI server: service-based integration and centralized remediation operations
91
+ - VS Code extension: Node CVE Remediator for editor-side scanning and fix actions
91
92
 
92
- Public API naming canon: `runTests`, `policy`, `evidence`, `patchCount`, and `patchesDir`.
93
+ Patch lifecycle operations are exposed consistently:
93
94
 
94
- ## Documentation
95
+ - CLI: `autoremediator patches list`, `autoremediator patches inspect`, `autoremediator patches validate`
96
+ - SDK: `listPatchArtifacts`, `inspectPatchArtifact`, `validatePatchArtifact`
97
+ - MCP and OpenAPI: equivalent patch lifecycle operations
95
98
 
96
- - [Docs Home](https://rawlings.github.io/autoremediator/)
97
- - [Getting Started](https://rawlings.github.io/autoremediator/docs/getting-started): install and first remediation runs
98
- - [CLI Reference](https://rawlings.github.io/autoremediator/docs/cli): command and option semantics
99
- - [Scanner Inputs](https://rawlings.github.io/autoremediator/docs/scanner-inputs): scanner adapters and format constraints
100
- - [Policy and Safety](https://rawlings.github.io/autoremediator/docs/policy-and-safety): policy precedence and operational guardrails
101
- - [API and SDK](https://rawlings.github.io/autoremediator/docs/api-sdk): public programmatic entry points
102
- - [Integrations](https://rawlings.github.io/autoremediator/docs/integrations): CI workflows and service integrations
103
- - [Contributor Guide](https://rawlings.github.io/autoremediator/docs/contributor-guide): architecture and extension guidance
99
+ ## Designed for agentic workflows
100
+
101
+ Recommended orchestration flow:
104
102
 
105
- ## Product Direction
103
+ 1. call `planRemediation` to generate a non-mutating plan
104
+ 2. apply `remediate` after policy and approval checks
105
+ 3. inspect and validate patch artifacts when fallback patching occurs
106
106
 
107
- - Prioritize automation workflows over one-off manual runs
108
- - Configure policy and branch protection before broad rollout
109
- - Use CI summaries and evidence outputs for operational governance
107
+ Public naming canon across surfaces: `runTests`, `policy`, `evidence`, `patchCount`, `patchesDir`.
110
108
 
111
- ## Package
109
+ Native change-request support includes GitHub and GitLab workflows, including grouped scan strategies, orchestration-friendly run metadata, and plan-first execution patterns for agentic systems.
112
110
 
113
- - [npm package](https://www.npmjs.com/package/autoremediator)
114
- - [repository](https://github.com/Rawlings/autoremediator)
111
+ Packaging shortcut: `pnpm build:vsix` builds the publishable VSIX from the repository root.
112
+
113
+ ## Use cases
114
+
115
+ - Autonomous security automation in GitHub workflows and CI/CD pipelines
116
+ - Deterministic CI gating for unresolved dependency exposure
117
+ - Scanner-to-remediation conversion for high-volume vulnerability backlogs
118
+ - Embedded remediation for internal AI assistants, copilots, bots, and security platforms
119
+ - Portfolio-wide standardization across large Node.js service estates
120
+
121
+ ## Documentation
122
+
123
+ - [Docs Home](https://rawlings.github.io/autoremediator/)
124
+ - [Getting Started](https://rawlings.github.io/autoremediator/docs/getting-started): setup, first run, and result interpretation
125
+ - [CLI Reference](https://rawlings.github.io/autoremediator/docs/cli): commands, options, and CI semantics
126
+ - [Scanner Inputs](https://rawlings.github.io/autoremediator/docs/scanner-inputs): supported formats and parsing constraints
127
+ - [Policy and Safety](https://rawlings.github.io/autoremediator/docs/policy-and-safety): policy precedence, safeguards, and fallback controls
128
+ - [API and SDK](https://rawlings.github.io/autoremediator/docs/api-sdk): programmatic integration and CI summary utilities
129
+ - [Integrations](https://rawlings.github.io/autoremediator/docs/integrations): GitHub Actions, MCP, OpenAPI, and multi-stage pipelines
130
+ - [Agent Ecosystems](https://rawlings.github.io/autoremediator/docs/agent-ecosystems): MCP host setup and orchestration examples
131
+ - [Contributor Guide](https://rawlings.github.io/autoremediator/docs/contributor-guide): architecture and contribution standards
132
+
133
+ ## Project References
134
+
135
+ - [Contributing](CONTRIBUTING.md)
136
+ - [Agent Modes](AGENTS.md)
137
+ - [LLM Context Summary](llms.txt)
115
138
 
116
139
  ## License
117
140