autoremediator 0.8.0 → 0.9.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +90 -72
- package/dist/{chunk-5S4Y3WVZ.js → chunk-EDPCMRUW.js} +3759 -3095
- package/dist/chunk-EDPCMRUW.js.map +1 -0
- package/dist/cli.js +63 -8
- package/dist/cli.js.map +1 -1
- package/dist/{remediate-from-scan-BmFPbhp2.d.ts → index-Di8lB6CG.d.ts} +74 -1
- package/dist/index.d.ts +4 -6
- package/dist/index.js +1 -3
- package/dist/mcp/server.d.ts +1 -1
- package/dist/mcp/server.js +1 -1
- package/dist/openapi/server.d.ts +256 -246
- package/dist/openapi/server.js +231 -226
- package/dist/openapi/server.js.map +1 -1
- package/dist/{options-schema-DHXBY2qm.d.ts → options-schema-CH5GjZY1.d.ts} +10 -0
- package/llms.txt +8 -2
- package/package.json +5 -4
- package/dist/chunk-5S4Y3WVZ.js.map +0 -1
package/README.md
CHANGED
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
|
|
3
3
|
[](https://www.npmjs.com/package/autoremediator)
|
|
4
4
|
[](https://www.npmjs.com/package/autoremediator)
|
|
5
|
-
[](
|
|
5
|
+
[](LICENSE)
|
|
6
6
|
[](https://www.npmjs.com/package/autoremediator)
|
|
7
7
|
[](https://github.com/Rawlings/autoremediator/pkgs/container/autoremediator)
|
|
8
8
|
[](https://github.com/marketplace/actions/autoremediator)
|
|
@@ -12,111 +12,129 @@
|
|
|
12
12
|
> It can reduce exposure windows, but it can also introduce operational and supply-chain risk if used without policy controls.
|
|
13
13
|
> Autoremediator is designed for risk-aware automation teams, and should be paired with explicit policy, CI safeguards, and repository protection rules.
|
|
14
14
|
|
|
15
|
-
Autoremediator is
|
|
15
|
+
Autoremediator is an agentic CVE remediation platform for Node.js.
|
|
16
16
|
|
|
17
|
-
It
|
|
17
|
+
It turns dependency security from fragmented backlog triage into an autonomous remediation pipeline with threat-intelligence correlation, exploitability-aware prioritization, deterministic execution, and machine-readable evidence.
|
|
18
18
|
|
|
19
|
-
|
|
19
|
+
It is built for AI-native software delivery, agentic security operations, and policy-governed software supply chain response.
|
|
20
20
|
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
It also exposes non-mutating planning and correlation context for agent orchestration workflows.
|
|
21
|
+
The outcome is faster containment of dependency exposure, stronger remediation posture, and cleaner telemetry across CI/CD, platform automation, and agent-driven workflows.
|
|
24
22
|
|
|
25
23
|
See the [documentation](https://rawlings.github.io/autoremediator/docs/getting-started) to get started.
|
|
26
24
|
|
|
27
|
-
##
|
|
25
|
+
## Security remediation, closed loop
|
|
28
26
|
|
|
29
|
-
|
|
30
|
-
- Risk-informed prioritization via KEV and EPSS enrichment
|
|
31
|
-
- Scanner-driven remediation for npm audit, yarn audit, and SARIF inputs
|
|
32
|
-
- Clear CI summary outputs for routing and governance
|
|
33
|
-
- Patch lifecycle workflows for listing, inspecting, and validating generated patch artifacts
|
|
27
|
+
Autoremediator operates as a remediation control plane, not a scanner wrapper.
|
|
34
28
|
|
|
35
|
-
|
|
29
|
+
It correlates ecosystem advisory data, exploitability telemetry, and operational policy to drive remediation decisions across repositories, portfolios, service surfaces, and agentic execution paths.
|
|
36
30
|
|
|
37
|
-
-
|
|
38
|
-
- CI enforcement gates that fail on unresolved remediation outcomes
|
|
39
|
-
- Scanner-to-fix automation from npm audit, yarn audit, and SARIF outputs
|
|
40
|
-
- Platform-level remediation orchestration across many services
|
|
41
|
-
- Agentic integration via CLI, SDK, MCP, and OpenAPI
|
|
31
|
+
When a clean upgrade path exists, it executes a safe dependency bump. When exposure is transitive, it applies package-manager-native overrides and resolutions. When no safe fixed version exists, it escalates into controlled patch generation with confidence thresholds, validation gates, and artifact tracking.
|
|
42
32
|
|
|
43
|
-
|
|
33
|
+
Every remediation path is constrained by policy, dry-run controls, validation requirements, and auditable evidence artifacts so autonomous response stays governable, reviewable, and automation-safe.
|
|
44
34
|
|
|
45
|
-
|
|
35
|
+
## What sets it apart
|
|
46
36
|
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
37
|
+
- Exploit-aware prioritization beyond severity-centric triage
|
|
38
|
+
- Deterministic remediation orchestration with explicit safety and failure semantics
|
|
39
|
+
- Multi-strategy execution across direct bumps, transitive overrides, and controlled patch fallback
|
|
40
|
+
- Portfolio-scale coverage across large Node.js repository estates
|
|
41
|
+
- AI ecosystem interoperability through MCP, OpenAPI, SDK, CLI, and agent runtime surfaces
|
|
42
|
+
- Structured evidence, rollups, outcome taxonomy, and agent-consumable telemetry for governance and security analytics
|
|
53
43
|
|
|
54
|
-
|
|
44
|
+
## From signal to remediation
|
|
55
45
|
|
|
56
|
-
|
|
46
|
+
Canonical remediation flow:
|
|
57
47
|
|
|
58
|
-
|
|
59
|
-
|
|
60
|
-
|
|
48
|
+
1. lookup CVE intelligence
|
|
49
|
+
2. inspect installed dependency inventory
|
|
50
|
+
3. match vulnerable installed versions
|
|
51
|
+
4. attempt safe direct dependency version bump
|
|
52
|
+
5. if transitive, attempt package-manager-native override or resolution
|
|
53
|
+
6. if still unresolved, attempt controlled patch fallback and emit patch artifacts
|
|
54
|
+
|
|
55
|
+
Outputs remain deterministic across interfaces, including `strategyCounts`, `dependencyScopeCounts`, and `unresolvedByReason`, so CI systems, workflow engines, autonomous agents, and orchestration runtimes can route outcomes without reparsing nested result trees.
|
|
61
56
|
|
|
62
|
-
|
|
57
|
+
Patch artifacts are written to `patchesDir` with `.patch.json` manifests and can be listed, inspected, and validated in follow-on automation.
|
|
63
58
|
|
|
64
|
-
|
|
59
|
+
## Intelligence that drives action
|
|
65
60
|
|
|
66
61
|
Primary sources:
|
|
67
62
|
|
|
68
|
-
- [OSV](https://osv.dev)
|
|
69
|
-
- [GitHub Advisory Database](https://github.com/advisories)
|
|
70
|
-
- [NVD](https://nvd.nist.gov)
|
|
63
|
+
- [OSV](https://osv.dev): ecosystem-first vulnerability records and affected or fixed ranges
|
|
64
|
+
- [GitHub Advisory Database](https://github.com/advisories): package advisories and ecosystem metadata
|
|
65
|
+
- [NVD](https://nvd.nist.gov): severity context and CVE reference data
|
|
71
66
|
|
|
72
|
-
|
|
67
|
+
Enrichment and prioritization sources:
|
|
73
68
|
|
|
74
|
-
- [CISA KEV](https://www.cisa.gov/known-exploited-vulnerabilities-catalog)
|
|
75
|
-
- [FIRST EPSS](https://www.first.org/epss/)
|
|
76
|
-
- [CVE Services](https://www.cve.org/)
|
|
77
|
-
- [GitLab Advisory Database](https://advisories.gitlab.com)
|
|
78
|
-
- [CERT/CC Vulnerability Notes](https://www.kb.cert.org/vuls/)
|
|
79
|
-
- [deps.dev](https://deps.dev)
|
|
80
|
-
- [OpenSSF Scorecard](https://securityscorecards.dev)
|
|
69
|
+
- [CISA KEV](https://www.cisa.gov/known-exploited-vulnerabilities-catalog): known-exploited vulnerability signal
|
|
70
|
+
- [FIRST EPSS](https://www.first.org/epss/): exploit probability and percentile scoring
|
|
71
|
+
- [CVE Services](https://www.cve.org/): additional CVE references and descriptions
|
|
72
|
+
- [GitLab Advisory Database](https://advisories.gitlab.com): supplemental advisory matching
|
|
73
|
+
- [CERT/CC Vulnerability Notes](https://www.kb.cert.org/vuls/): analyst context for selected CVEs
|
|
74
|
+
- [deps.dev](https://deps.dev): package metadata coverage checks
|
|
75
|
+
- [OpenSSF Scorecard](https://securityscorecards.dev): package trust and repository posture signals
|
|
81
76
|
- Optional vendor and commercial feeds via environment-configured connectors
|
|
82
77
|
|
|
83
|
-
Trust
|
|
78
|
+
Trust model principles:
|
|
84
79
|
|
|
85
|
-
-
|
|
86
|
-
-
|
|
87
|
-
-
|
|
88
|
-
-
|
|
80
|
+
- Correlate across multiple advisory, exploitability, and trust sources
|
|
81
|
+
- Preserve evidence so remediation decisions remain auditable
|
|
82
|
+
- Enforce policy and validation gates before outcomes are marked resolved
|
|
83
|
+
- Treat low-confidence or unresolved outcomes as explicit escalation inputs
|
|
89
84
|
|
|
90
|
-
##
|
|
85
|
+
## Built for every surface
|
|
91
86
|
|
|
92
|
-
- CLI: workflow and CI
|
|
93
|
-
- SDK:
|
|
94
|
-
- MCP:
|
|
95
|
-
- OpenAPI: service-based
|
|
87
|
+
- CLI: workflow jobs and CI runs
|
|
88
|
+
- SDK: `remediate`, `planRemediation`, `remediateFromScan`
|
|
89
|
+
- MCP server: agent ecosystem integration, tool invocation, and LLM-orchestrated workflows
|
|
90
|
+
- OpenAPI server: service-based integration and centralized remediation operations
|
|
91
|
+
- VS Code extension: Node CVE Remediator for editor-side scanning and fix actions
|
|
96
92
|
|
|
97
|
-
|
|
93
|
+
Patch lifecycle operations are exposed consistently:
|
|
98
94
|
|
|
99
|
-
|
|
95
|
+
- CLI: `autoremediator patches list`, `autoremediator patches inspect`, `autoremediator patches validate`
|
|
96
|
+
- SDK: `listPatchArtifacts`, `inspectPatchArtifact`, `validatePatchArtifact`
|
|
97
|
+
- MCP and OpenAPI: equivalent patch lifecycle operations
|
|
100
98
|
|
|
101
|
-
|
|
102
|
-
|
|
103
|
-
|
|
104
|
-
|
|
105
|
-
|
|
106
|
-
|
|
107
|
-
|
|
108
|
-
|
|
99
|
+
## Designed for agentic workflows
|
|
100
|
+
|
|
101
|
+
Recommended orchestration flow:
|
|
102
|
+
|
|
103
|
+
1. call `planRemediation` to generate a non-mutating plan
|
|
104
|
+
2. apply `remediate` after policy and approval checks
|
|
105
|
+
3. inspect and validate patch artifacts when fallback patching occurs
|
|
106
|
+
|
|
107
|
+
Public naming canon across surfaces: `runTests`, `policy`, `evidence`, `patchCount`, `patchesDir`.
|
|
109
108
|
|
|
110
|
-
|
|
109
|
+
Native change-request support includes GitHub and GitLab workflows, including grouped scan strategies, orchestration-friendly run metadata, and plan-first execution patterns for agentic systems.
|
|
111
110
|
|
|
112
|
-
|
|
113
|
-
- Configure policy and branch protection before broad rollout
|
|
114
|
-
- Use CI summaries and evidence outputs for operational governance
|
|
111
|
+
Packaging shortcut: `pnpm build:vsix` builds the publishable VSIX from the repository root.
|
|
115
112
|
|
|
116
|
-
##
|
|
113
|
+
## Use cases
|
|
117
114
|
|
|
118
|
-
-
|
|
119
|
-
-
|
|
115
|
+
- Autonomous security automation in GitHub workflows and CI/CD pipelines
|
|
116
|
+
- Deterministic CI gating for unresolved dependency exposure
|
|
117
|
+
- Scanner-to-remediation conversion for high-volume vulnerability backlogs
|
|
118
|
+
- Embedded remediation for internal AI assistants, copilots, bots, and security platforms
|
|
119
|
+
- Portfolio-wide standardization across large Node.js service estates
|
|
120
|
+
|
|
121
|
+
## Documentation
|
|
122
|
+
|
|
123
|
+
- [Docs Home](https://rawlings.github.io/autoremediator/)
|
|
124
|
+
- [Getting Started](https://rawlings.github.io/autoremediator/docs/getting-started): setup, first run, and result interpretation
|
|
125
|
+
- [CLI Reference](https://rawlings.github.io/autoremediator/docs/cli): commands, options, and CI semantics
|
|
126
|
+
- [Scanner Inputs](https://rawlings.github.io/autoremediator/docs/scanner-inputs): supported formats and parsing constraints
|
|
127
|
+
- [Policy and Safety](https://rawlings.github.io/autoremediator/docs/policy-and-safety): policy precedence, safeguards, and fallback controls
|
|
128
|
+
- [API and SDK](https://rawlings.github.io/autoremediator/docs/api-sdk): programmatic integration and CI summary utilities
|
|
129
|
+
- [Integrations](https://rawlings.github.io/autoremediator/docs/integrations): GitHub Actions, MCP, OpenAPI, and multi-stage pipelines
|
|
130
|
+
- [Agent Ecosystems](https://rawlings.github.io/autoremediator/docs/agent-ecosystems): MCP host setup and orchestration examples
|
|
131
|
+
- [Contributor Guide](https://rawlings.github.io/autoremediator/docs/contributor-guide): architecture and contribution standards
|
|
132
|
+
|
|
133
|
+
## Project References
|
|
134
|
+
|
|
135
|
+
- [Contributing](CONTRIBUTING.md)
|
|
136
|
+
- [Agent Modes](AGENTS.md)
|
|
137
|
+
- [LLM Context Summary](llms.txt)
|
|
120
138
|
|
|
121
139
|
## License
|
|
122
140
|
|