About the Project

Eliminating Security Bottlenecks through Reachability Intelligence.

The project aimed to solve the “Broken Window Paradox” in DevSecOps: where critical threats are missed because security teams are overwhelmed by thousands of non-exploitable alerts. By focusing on Execution Path Analysis, we addressed the gap left by traditional scanners that only check for files on a disk. The result is a self-healing pipeline that not only detects threats but autonomously opens remediation Pull Requests to harden the environment. For teams comparing DevSecOps vs DevOps, this project shows why security automation should be treated as part of engineering delivery, not as a separate approval layer.

company-logo

Project Challenges

Building this autonomous environment required solving several unique challenges in the vulnerability management lifecycle:

banner
creole stuidos round ring waving Hand
three dots
Severe Alert Fatigue : The client's legacy Node.js environment was flagging over 1,800 vulnerabilities per scan. Manually triaging this volume was impossible for their security team, leading to critical supply chain risks being ignored.
creole stuidos round ring waving Hand
three dots
Supply Chain Poisoning : Traditional manual updates were too slow. An attacker could exploit a known vulnerability in an outdated base image (Node:14) before the team even finished triaging the weekly scan report.
creole stuidos round ring waving Hand
three dots
High False-Positive Rates : 99% of the flagged vulnerabilities existed in system libraries (like Perl or OpenLDAP) that the application never actually executed. We needed a way to distinguish between "vulnerable on disk" and "exploitable in memory."
creole stuidos round ring waving Hand
three dots
Remediation Resistance : Developers were hesitant to patch images because they feared breaking dependencies. We needed a system that validated the fix by comparing "Before" and "After" states to prove the security value without breaking the app.

Tech Stack used

creole stuidos round ring waving Hand
Need help?

How Did We Help?

We approached the development with a phased DevSecOps strategy to reduce vulnerability noise, automate remediation, and create a compliance-ready security workflow.
Vulnerability Baseline

Integrated Trivy into GitHub Actions to scan legacy containers and create a raw vulnerability baseline for the reachability intelligence engine setup.

Risk Prioritization

Reviewed all 1,811 reported issues to separate theoretical package findings from real runtime risk helping the team focus on exploitable threats fast.

Reachability Engine

Built a Python reachability engine that simulated execution paths, filtered dormant CVEs, and identified vulnerabilities reachable by the app runtime.

Auto Remediation Logic

Created remediation logic to update the Dockerfile, replace the vulnerable Node base image, and migrate the service to a hardened Alpine image safely.

Security Validation

Ran a second Trivy scan after remediation to compare before and after states, proving that fixes reduced risk without breaking the live app workflows.

VEX Audit Reports

Generated VEX-compliant HTML/CSS reports showing legacy alerts, reachable threats, fixed risks, and before and after attack surface reduction metrics.

Compliance Archiving

Archived security reports as permanent build artifacts, giving compliance teams a reusable audit trail for SOC2, ISO27001 and future security reviews.

creole stuidos round ring

The outcome

The project emerged as a model for modern DevSecOps, replacing a “scan-only” culture with a “remediation-first” ecosystem. This shift is also an important step in the DevOps maturity model, where teams move from manual, reactive operations to automated, measurable, and continuously improving delivery systems.

  • Noise Reduction: Reduced alert volume from 1,811 theoretical risks to 4 reachable threats (99.7% reduction).
  • Deployment Speed: Reduced the Mean Time to Remediation (MTTR) from 5 days to under 30 seconds.
  • Compliance Ready: Automated the generation of HTML audit trails, making the project ready for SOC2/ISO27001 audits.
  • Zero Downtime Patching: The autonomous PR workflow ensures that security hardening happens in parallel with development, never blocking the release cycle.
clinet-img
Ethan Walker
“The Sentinel-Patch engine transformed our security posture overnight. We went from being buried under 2,000 alerts to having a self-healing pipeline that identifies and fixes reachable threats before we even start our morning meetings. It is the most intuitive approach to vulnerability management we’ve ever seen.”
banner-img