The Evidence Engine
One scan. 12 frameworks. 35+ signed, machine-readable report formats. Traffic-light pass / warn / fail readiness against FedRAMP, DORA, ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST CSF, and CMMC — from your own code, on your own machine.
npx @raknor/aegis scan ./your-project
npx @raknor/aegis run ./your-project --sarif --threat-intel
Free Readiness Preview
The free npx scan produces a visual readiness indicator for nine compliance frameworks based on the severity and class of findings detected in your code. Pass / warn / fail status, percentage toward each baseline, and the gap that's blocking it.
This is a preview indicator. The free scan uses regex-based detection and cannot see taint flows, control coverage, or SBOM health. Real audit-grade evidence (OSCAL packages, DORA pillar mapping, FedRAMP ConMon) requires the licensed scan.
Language Support
Not regex. Not heuristics. Full abstract syntax tree parsing via tree-sitter, with inter-procedural call graph construction and cross-file taint analysis.
Scanning Capabilities
Every scanner produces findings in a normalized format. SARIF 2.1.0 output is standard. Cross-file taint analysis traces data flow across module boundaries.
What's Right, Not Just What's Wrong
Every SAST tool on the market tells you what’s broken. FedRAMP, SOC 2, and ISO 27001 also require evidence of what’s implemented — what controls are present, what policies are enforced, what security architecture is in place. That evidence doesn’t exist in a vulnerability report.
AEGIS detects implemented security controls directly from your codebase. 68 detection patterns across 12 NIST 800-53 control families. Each detection produces an OSCAL control implementation statement — the exact artifact auditors and 3PAOs consume.
| Control Family | What AEGIS Detects |
|---|---|
| Access Control (AC) | RBAC decorators, auth middleware, session management, MFA |
| Audit & Accountability (AU) | Logging frameworks, audit trail writes, CloudTrail integration |
| Configuration Management (CM) | IaC, config validation, change tracking, version pinning |
| Identification & Auth (IA) | Password hashing (bcrypt/argon2), token validation, MFA flows |
| System & Comms Protection (SC) | TLS configuration, AES-256, input sanitization, CORS |
| System & Info Integrity (SI) | Input validation, malware detection, patch management |
Plus 6 additional families: Security Assessment (CA), Incident Response (IR), Media Protection (MP), Planning (PL), Risk Assessment (RA), and System Acquisition (SA).
Code scans cover technical controls. Organizational controls — access policies, incident response procedures, training requirements — live in ISMS documents. AEGIS ingests your ISMS markdown and maps 19 policy sections to 101 NIST controls, producing OSCAL statements for procedural evidence that code analysis can’t reach.
The merge logic prefers code evidence (automated, verifiable) and supplements with ISMS evidence for procedural controls. Controls covered by both sources receive a “defense-in-depth” designation — stronger evidence for auditors.
A Veracode scan tells you about 47 vulnerabilities. It says nothing about whether you have RBAC, whether your audit logging works, or whether your encryption meets NIST standards. You still need a human to manually inventory implemented controls for every FedRAMP assessment. AEGIS produces both reports in one pass. What’s broken and what’s working. The vulnerability findings feed remediation. The capability findings feed compliance evidence. Together they feed Arena certification.
Compliance Mapping
Every finding maps to controls across all twelve frameworks simultaneously. Context-aware risk adjustment factors reachability, exposure, and compensating controls into the final score.
Output Formats
No other scanning tool produces OSCAL, DORA pillar mapping, VEX, and CycloneDX SBOM from a single pass over the same provenance chain. Every report is signed, timestamped, and independently verifiable. Group them by who reads them:
Cryptographic Trust
Not just a scan report. A verifiable evidence chain. Every pipeline action produces a hash-chained provenance entry with algorithm-agile cryptography. SLSA-compatible export.
How It Works
AEGIS is the entry point. Stage 0 is free and runs locally. Stages 1 and 2 unlock when you need audit-grade evidence or third-party certification.
npx @raknor/aegis scan ./your-project — severity histogram, first 50 findings, and traffic-light pass / warn / fail against 8 frameworks. Runs locally. No signup. No upload.For Channel Partners
AEGIS rebrands. Partners deploy the same engine under their own company name, logo, colors, and product name. Your prospects never need to know what AEGIS is — they see your brand and get a diagnostic from their own code.
When a prospect runs a white-labeled scan, the structured output (framework percentages, severity counts, missing capabilities) is exportable to the partner's CRM as structured fields. This is not a PDF attachment — it is lead qualification data that pre-scopes the engagement.
Under the Hood — for engineers
Every stage runs under consequence-tier gating (T1 reversible read → T4 external side effect). Each action produces a hash-chained provenance entry. The chain is append-only and independently verifiable.
Validated
Not hypothetical capabilities. Measured results against industry-standard test suites and production codebases.
| NIST Juliet Test Suite | 28,404 flawed C/C++ files | 100% detection |
| OSCAL schema validation | NIST v1.1.2 — SSP, Assessment Results, POA&M | All 3 pass |
| Cross-framework consistency | Same findings across 12 framework mappings | Verified |
| Production codebase scan | 921 files, all evidence packages generated | 28 findings |
| Round-trip invariant test | Generated invariants fed back into security review | New CWE-78 found |
Cybersecurity Certification Failures
AEGIS findings feed directly into the Raknor certification decision. The following cybersecurity conditions result in certification denial regardless of governance score:
Cybersecurity findings are deterministic. A system with a reachable critical vulnerability cannot be Raknor certified, regardless of its governance behavior score.
Traffic-light readiness against 8 frameworks in seconds. Runs locally. No signup. No upload. No runtime cost.
Need OSCAL, DORA, or audit-grade evidence? Request licensed access.
npx @raknor/aegis scan ./your-projectnpx @raknor/aegis run ./your-project --sarif --threat-intel