-
Notifications
You must be signed in to change notification settings - Fork 1.3k
Description
The proposal is to introduce a Deterministic Multi-Engine Auditing workflow.
Currently, security teams have to jump between different tools (SAST, Secrets, IaC) which produce fragmented reports and inconsistent results. I propose a unified, deterministic engine that orchestrates multiple security layers while maintaining strict Zero Telemetry and Offline-first principles.
Key technical requirements:
- Deterministic Execution: Every scan must be 100% reproducible. Detection logic is based on explicit rules (Semgrep, Gitleaks, etc.), ensuring no hidden or probabilistic logic.
- Unified Security Snapshot: A single execution that evaluates Dockerfiles, CI/CD workflows, and IaC in one go, producing a consistent "Source of Truth" report.
- Advisory-only AI: Optional remediation advice (via local LLMs like Ollama) that is strictly separated from the detection engine to prevent AI hallucinations from affecting security scores.
- Professional Evidence: Generation of technical HTML/JSON reports specifically formatted for SOC2/ISO27001 compliance evidence.
Examples
Example Code (Terraform):
resource "aws_db_instance" "default" {
allocated_storage = 10
engine = "mysql"
publicly_accessible = true # Violation
password = "supersecret123" # Another violation (Secret)
}
Expected Inputs:
- Project source code (Local).
- (Optional) Local LLM endpoint for remediation advice.
Expected Outputs (Auditor Core Logic):
- Unified Findings: The engine identifies BOTH the infrastructure misconfiguration (public DB) and the hardcoded secret in a single pass.
- Decision: FAIL (1).
- Report: An HTML report in the
reports/directory containing:Detector: IaC (Checkov/Internal)-> "Publicly accessible DB"Detector: Secrets (Gitleaks)-> "Hardcoded password found"Remediation (AI Advisory):"Move password to secret manager and set publicly_accessible to false."
Additional context
This feature request is based on the Auditor Core Baseline architecture. The focus is on Explainability. Unlike modern black-box security tools, this approach ensures that every finding is mapped to a specific, transparent detector. By keeping the process Offline-first, we ensure that sensitive infrastructure code and identified vulnerabilities never leave the local environment.