autoremediator 0.8.0 → 0.9.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -2,7 +2,7 @@
2
2
 
3
3
  [![npm version](https://img.shields.io/npm/v/autoremediator.svg)](https://www.npmjs.com/package/autoremediator)
4
4
  [![npm downloads](https://img.shields.io/npm/dm/autoremediator.svg)](https://www.npmjs.com/package/autoremediator)
5
- [![license](https://img.shields.io/npm/l/autoremediator.svg)](https://github.com/Rawlings/autoremediator/blob/master/LICENSE)
5
+ [![license](https://img.shields.io/npm/l/autoremediator.svg)](LICENSE)
6
6
  [![node](https://img.shields.io/node/v/autoremediator.svg)](https://www.npmjs.com/package/autoremediator)
7
7
  [![Docker](https://img.shields.io/badge/docker-ghcr.io-blue)](https://github.com/Rawlings/autoremediator/pkgs/container/autoremediator)
8
8
  [![GitHub Actions](https://img.shields.io/badge/github--actions-marketplace-blue)](https://github.com/marketplace/actions/autoremediator)
@@ -12,111 +12,129 @@
12
12
  > It can reduce exposure windows, but it can also introduce operational and supply-chain risk if used without policy controls.
13
13
  > Autoremediator is designed for risk-aware automation teams, and should be paired with explicit policy, CI safeguards, and repository protection rules.
14
14
 
15
- Autoremediator is a risk-aware, agentic Node.js CVE remediation package.
15
+ Autoremediator is an agentic CVE remediation platform for Node.js.
16
16
 
17
- It correlates OSV package intelligence with CISA KEV known-exploited signals and FIRST EPSS exploit probability scores to prioritize vulnerabilities more likely to matter in production.
17
+ It turns dependency security from fragmented backlog triage into an autonomous remediation pipeline with threat-intelligence correlation, exploitability-aware prioritization, deterministic execution, and machine-readable evidence.
18
18
 
19
- This package is designed for teams that want remediation integrated into GitHub workflows and CI pipelines with policy and evidence controls.
19
+ It is built for AI-native software delivery, agentic security operations, and policy-governed software supply chain response.
20
20
 
21
- It exposes stable SDK and CLI surfaces for direct CVE remediation and scanner-driven automation.
22
-
23
- It also exposes non-mutating planning and correlation context for agent orchestration workflows.
21
+ The outcome is faster containment of dependency exposure, stronger remediation posture, and cleaner telemetry across CI/CD, platform automation, and agent-driven workflows.
24
22
 
25
23
  See the [documentation](https://rawlings.github.io/autoremediator/docs/getting-started) to get started.
26
24
 
27
- ## Why Teams Use It
25
+ ## Security remediation, closed loop
28
26
 
29
- - Deterministic remediation pipeline with policy-first behavior
30
- - Risk-informed prioritization via KEV and EPSS enrichment
31
- - Scanner-driven remediation for npm audit, yarn audit, and SARIF inputs
32
- - Clear CI summary outputs for routing and governance
33
- - Patch lifecycle workflows for listing, inspecting, and validating generated patch artifacts
27
+ Autoremediator operates as a remediation control plane, not a scanner wrapper.
34
28
 
35
- ## Primary Use Cases
29
+ It correlates ecosystem advisory data, exploitability telemetry, and operational policy to drive remediation decisions across repositories, portfolios, service surfaces, and agentic execution paths.
36
30
 
37
- - Scheduled GitHub Actions remediation jobs with auto-generated pull requests
38
- - CI enforcement gates that fail on unresolved remediation outcomes
39
- - Scanner-to-fix automation from npm audit, yarn audit, and SARIF outputs
40
- - Platform-level remediation orchestration across many services
41
- - Agentic integration via CLI, SDK, MCP, and OpenAPI
31
+ When a clean upgrade path exists, it executes a safe dependency bump. When exposure is transitive, it applies package-manager-native overrides and resolutions. When no safe fixed version exists, it escalates into controlled patch generation with confidence thresholds, validation gates, and artifact tracking.
42
32
 
43
- ## Core Pipeline Behavior
33
+ Every remediation path is constrained by policy, dry-run controls, validation requirements, and auditable evidence artifacts so autonomous response stays governable, reviewable, and automation-safe.
44
34
 
45
- Autoremediator follows a deterministic remediation order:
35
+ ## What sets it apart
46
36
 
47
- 1. lookup CVE intelligence
48
- 2. inspect local dependency inventory
49
- 3. match vulnerable installed versions
50
- 4. attempt direct safe version remediation
51
- 5. attempt transitive override/resolution when direct bump is not possible
52
- 6. attempt patch fallback only when safe version paths cannot remediate
37
+ - Exploit-aware prioritization beyond severity-centric triage
38
+ - Deterministic remediation orchestration with explicit safety and failure semantics
39
+ - Multi-strategy execution across direct bumps, transitive overrides, and controlled patch fallback
40
+ - Portfolio-scale coverage across large Node.js repository estates
41
+ - AI ecosystem interoperability through MCP, OpenAPI, SDK, CLI, and agent runtime surfaces
42
+ - Structured evidence, rollups, outcome taxonomy, and agent-consumable telemetry for governance and security analytics
53
43
 
54
- Safety and policy controls are applied through each stage.
44
+ ## From signal to remediation
55
45
 
56
- Patch lifecycle operations are available through:
46
+ Canonical remediation flow:
57
47
 
58
- - CLI: `autoremediator patches list`, `autoremediator patches inspect`, `autoremediator patches validate`
59
- - SDK: `listPatchArtifacts`, `inspectPatchArtifact`, `validatePatchArtifact`
60
- - MCP and OpenAPI: equivalent patch artifact tools and routes
48
+ 1. lookup CVE intelligence
49
+ 2. inspect installed dependency inventory
50
+ 3. match vulnerable installed versions
51
+ 4. attempt safe direct dependency version bump
52
+ 5. if transitive, attempt package-manager-native override or resolution
53
+ 6. if still unresolved, attempt controlled patch fallback and emit patch artifacts
54
+
55
+ Outputs remain deterministic across interfaces, including `strategyCounts`, `dependencyScopeCounts`, and `unresolvedByReason`, so CI systems, workflow engines, autonomous agents, and orchestration runtimes can route outcomes without reparsing nested result trees.
61
56
 
62
- ## Trust and Advisory Sources
57
+ Patch artifacts are written to `patchesDir` with `.patch.json` manifests and can be listed, inspected, and validated in follow-on automation.
63
58
 
64
- The remediation engine relies on public vulnerability intelligence sources and deterministic policy checks.
59
+ ## Intelligence that drives action
65
60
 
66
61
  Primary sources:
67
62
 
68
- - [OSV](https://osv.dev)
69
- - [GitHub Advisory Database](https://github.com/advisories)
70
- - [NVD](https://nvd.nist.gov)
63
+ - [OSV](https://osv.dev): ecosystem-first vulnerability records and affected or fixed ranges
64
+ - [GitHub Advisory Database](https://github.com/advisories): package advisories and ecosystem metadata
65
+ - [NVD](https://nvd.nist.gov): severity context and CVE reference data
71
66
 
72
- Supplemental enrichment and prioritization sources:
67
+ Enrichment and prioritization sources:
73
68
 
74
- - [CISA KEV](https://www.cisa.gov/known-exploited-vulnerabilities-catalog)
75
- - [FIRST EPSS](https://www.first.org/epss/)
76
- - [CVE Services](https://www.cve.org/)
77
- - [GitLab Advisory Database](https://advisories.gitlab.com)
78
- - [CERT/CC Vulnerability Notes](https://www.kb.cert.org/vuls/)
79
- - [deps.dev](https://deps.dev)
80
- - [OpenSSF Scorecard](https://securityscorecards.dev)
69
+ - [CISA KEV](https://www.cisa.gov/known-exploited-vulnerabilities-catalog): known-exploited vulnerability signal
70
+ - [FIRST EPSS](https://www.first.org/epss/): exploit probability and percentile scoring
71
+ - [CVE Services](https://www.cve.org/): additional CVE references and descriptions
72
+ - [GitLab Advisory Database](https://advisories.gitlab.com): supplemental advisory matching
73
+ - [CERT/CC Vulnerability Notes](https://www.kb.cert.org/vuls/): analyst context for selected CVEs
74
+ - [deps.dev](https://deps.dev): package metadata coverage checks
75
+ - [OpenSSF Scorecard](https://securityscorecards.dev): package trust and repository posture signals
81
76
  - Optional vendor and commercial feeds via environment-configured connectors
82
77
 
83
- Trust controls:
78
+ Trust model principles:
84
79
 
85
- - correlate advisory data with local dependency inventory before action
86
- - prefer safe version remediation when fixed versions are available
87
- - emit structured evidence so every remediation attempt is traceable
88
- - preserve unresolved status when confidence or validation gates fail
80
+ - Correlate across multiple advisory, exploitability, and trust sources
81
+ - Preserve evidence so remediation decisions remain auditable
82
+ - Enforce policy and validation gates before outcomes are marked resolved
83
+ - Treat low-confidence or unresolved outcomes as explicit escalation inputs
89
84
 
90
- ## Surfaces
85
+ ## Built for every surface
91
86
 
92
- - CLI: workflow and CI execution
93
- - SDK: custom automation programs (`remediate`, `planRemediation`, `remediateFromScan`)
94
- - MCP: AI host integrations, including Claude Mythos workflows
95
- - OpenAPI: service-based automation
87
+ - CLI: workflow jobs and CI runs
88
+ - SDK: `remediate`, `planRemediation`, `remediateFromScan`
89
+ - MCP server: agent ecosystem integration, tool invocation, and LLM-orchestrated workflows
90
+ - OpenAPI server: service-based integration and centralized remediation operations
91
+ - VS Code extension: Node CVE Remediator for editor-side scanning and fix actions
96
92
 
97
- Public API naming canon: `runTests`, `policy`, `evidence`, `patchCount`, and `patchesDir`.
93
+ Patch lifecycle operations are exposed consistently:
98
94
 
99
- ## Documentation
95
+ - CLI: `autoremediator patches list`, `autoremediator patches inspect`, `autoremediator patches validate`
96
+ - SDK: `listPatchArtifacts`, `inspectPatchArtifact`, `validatePatchArtifact`
97
+ - MCP and OpenAPI: equivalent patch lifecycle operations
100
98
 
101
- - [Docs Home](https://rawlings.github.io/autoremediator/)
102
- - [Getting Started](https://rawlings.github.io/autoremediator/docs/getting-started): install and first remediation runs
103
- - [CLI Reference](https://rawlings.github.io/autoremediator/docs/cli): command and option semantics
104
- - [Scanner Inputs](https://rawlings.github.io/autoremediator/docs/scanner-inputs): scanner adapters and format constraints
105
- - [Policy and Safety](https://rawlings.github.io/autoremediator/docs/policy-and-safety): policy precedence and operational guardrails
106
- - [API and SDK](https://rawlings.github.io/autoremediator/docs/api-sdk): public programmatic entry points
107
- - [Integrations](https://rawlings.github.io/autoremediator/docs/integrations): CI workflows and service integrations
108
- - [Contributor Guide](https://rawlings.github.io/autoremediator/docs/contributor-guide): architecture and extension guidance
99
+ ## Designed for agentic workflows
100
+
101
+ Recommended orchestration flow:
102
+
103
+ 1. call `planRemediation` to generate a non-mutating plan
104
+ 2. apply `remediate` after policy and approval checks
105
+ 3. inspect and validate patch artifacts when fallback patching occurs
106
+
107
+ Public naming canon across surfaces: `runTests`, `policy`, `evidence`, `patchCount`, `patchesDir`.
109
108
 
110
- ## Product Direction
109
+ Native change-request support includes GitHub and GitLab workflows, including grouped scan strategies, orchestration-friendly run metadata, and plan-first execution patterns for agentic systems.
111
110
 
112
- - Prioritize automation workflows over one-off manual runs
113
- - Configure policy and branch protection before broad rollout
114
- - Use CI summaries and evidence outputs for operational governance
111
+ Packaging shortcut: `pnpm build:vsix` builds the publishable VSIX from the repository root.
115
112
 
116
- ## Package
113
+ ## Use cases
117
114
 
118
- - [npm package](https://www.npmjs.com/package/autoremediator)
119
- - [repository](https://github.com/Rawlings/autoremediator)
115
+ - Autonomous security automation in GitHub workflows and CI/CD pipelines
116
+ - Deterministic CI gating for unresolved dependency exposure
117
+ - Scanner-to-remediation conversion for high-volume vulnerability backlogs
118
+ - Embedded remediation for internal AI assistants, copilots, bots, and security platforms
119
+ - Portfolio-wide standardization across large Node.js service estates
120
+
121
+ ## Documentation
122
+
123
+ - [Docs Home](https://rawlings.github.io/autoremediator/)
124
+ - [Getting Started](https://rawlings.github.io/autoremediator/docs/getting-started): setup, first run, and result interpretation
125
+ - [CLI Reference](https://rawlings.github.io/autoremediator/docs/cli): commands, options, and CI semantics
126
+ - [Scanner Inputs](https://rawlings.github.io/autoremediator/docs/scanner-inputs): supported formats and parsing constraints
127
+ - [Policy and Safety](https://rawlings.github.io/autoremediator/docs/policy-and-safety): policy precedence, safeguards, and fallback controls
128
+ - [API and SDK](https://rawlings.github.io/autoremediator/docs/api-sdk): programmatic integration and CI summary utilities
129
+ - [Integrations](https://rawlings.github.io/autoremediator/docs/integrations): GitHub Actions, MCP, OpenAPI, and multi-stage pipelines
130
+ - [Agent Ecosystems](https://rawlings.github.io/autoremediator/docs/agent-ecosystems): MCP host setup and orchestration examples
131
+ - [Contributor Guide](https://rawlings.github.io/autoremediator/docs/contributor-guide): architecture and contribution standards
132
+
133
+ ## Project References
134
+
135
+ - [Contributing](CONTRIBUTING.md)
136
+ - [Agent Modes](AGENTS.md)
137
+ - [LLM Context Summary](llms.txt)
120
138
 
121
139
  ## License
122
140