The Evidence Engine

See your compliance posture
in seconds.

One scan. 12 frameworks. 35+ signed, machine-readable report formats. Traffic-light pass / warn / fail readiness against FedRAMP, DORA, ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST CSF, and CMMC — from your own code, on your own machine.

Free readiness preview — runs locally, nothing leaves your machine:
npx @raknor/aegis scan ./your-project
Full code scan with SARIF + OSCAL evidence (licensed):
npx @raknor/aegis run ./your-project --sarif --threat-intel
No signup. No upload. No runtime cost.

Free Readiness Preview

Traffic lights against eight frameworks

The free npx scan produces a visual readiness indicator for nine compliance frameworks based on the severity and class of findings detected in your code. Pass / warn / fail status, percentage toward each baseline, and the gap that's blocking it.

This is a preview indicator. The free scan uses regex-based detection and cannot see taint flows, control coverage, or SBOM health. Real audit-grade evidence (OSCAL packages, DORA pillar mapping, FedRAMP ConMon) requires the licensed scan.

FedRAMP High / Moderate
% toward baseline · pass / warn / fail
SOC 2 Type II
Trust Services Criteria readiness
ISO/IEC 27001:2022
Annex A control gap analysis
PCI-DSS v4.0
Cardholder data environment readiness
HIPAA
Security Rule technical safeguards
DORA (EU)
Mandatory Jan 2025 · 5 pillar readiness
NIST CSF 2.0
Govern / Identify / Protect / Detect / Respond
CMMC Level 2
DoD CUI · 110 NIST 800-171 requirements
The upgrade hinge
"You are 34% toward FedRAMP Moderate. Here's what's missing and how to fix it."
Free tier shows the gap. The licensed scan produces the OSCAL SSP, POA&M, ConMon package, and DORA pillar mapping that closes it — the artifacts an auditor or 3PAO actually consumes.

Language Support

Eight languages, tree-sitter AST

Not regex. Not heuristics. Full abstract syntax tree parsing via tree-sitter, with inter-procedural call graph construction and cross-file taint analysis.

JavaScript
tree-sitter · cross-file taint
TypeScript
tree-sitter · cross-file taint
C / C++
tree-sitter · CWE-120/134/170
C#
tree-sitter · namespace resolution
Python
tree-sitter · taint analysis
Java
tree-sitter · taint analysis
Go
tree-sitter · taint analysis
+ More
Language registry is extensible

Scanning Capabilities

Six scanner types, one unified output

Every scanner produces findings in a normalized format. SARIF 2.1.0 output is standard. Cross-file taint analysis traces data flow across module boundaries.

SAST
Static Analysis
AST-based pattern detection. Cross-file taint analysis with C# namespace resolution. Logic consistency checking (6 CWE categories).
SCA
Dependency Scanning
CVE lookup across npm, NuGet, PyPI, Maven. Typosquat detection via Levenshtein distance. SBOM generation.
DAST
Dynamic Analysis
Runtime security scanning. XSS, SQLi, CORS, security headers, TLS configuration, rate limit verification.
Secrets
Secret Detection
High-entropy string detection and pattern matching for API keys, tokens, credentials in source and config.
Cloud
Multi-Cloud Security
AWS, Azure, and GCP misconfiguration scanning. IAM, storage, network, encryption posture assessment.
Threat Intel
CISA KEV + EPSS + NVD
Cross-reference findings against CISA Known Exploited Vulnerabilities. Batch EPSS scoring. NVD CVE enrichment for high-risk findings.
8
Languages
6
Scanner Types
3
Cloud Providers
3
Intel Feeds

What's Right, Not Just What's Wrong

Security tools find problems. AEGIS also proves controls.

Every SAST tool on the market tells you what’s broken. FedRAMP, SOC 2, and ISO 27001 also require evidence of what’s implemented — what controls are present, what policies are enforced, what security architecture is in place. That evidence doesn’t exist in a vulnerability report.

AEGIS detects implemented security controls directly from your codebase. 68 detection patterns across 12 NIST 800-53 control families. Each detection produces an OSCAL control implementation statement — the exact artifact auditors and 3PAOs consume.

68
Detection patterns
12
NIST 800-53 control families
101
NIST controls from ISMS ingestion
Control Family What AEGIS Detects
Access Control (AC)RBAC decorators, auth middleware, session management, MFA
Audit & Accountability (AU)Logging frameworks, audit trail writes, CloudTrail integration
Configuration Management (CM)IaC, config validation, change tracking, version pinning
Identification & Auth (IA)Password hashing (bcrypt/argon2), token validation, MFA flows
System & Comms Protection (SC)TLS configuration, AES-256, input sanitization, CORS
System & Info Integrity (SI)Input validation, malware detection, patch management

Plus 6 additional families: Security Assessment (CA), Incident Response (IR), Media Protection (MP), Planning (PL), Risk Assessment (RA), and System Acquisition (SA).

ISMS Document Ingestion

Code scans cover technical controls. Organizational controls — access policies, incident response procedures, training requirements — live in ISMS documents. AEGIS ingests your ISMS markdown and maps 19 policy sections to 101 NIST controls, producing OSCAL statements for procedural evidence that code analysis can’t reach.

The merge logic prefers code evidence (automated, verifiable) and supplements with ISMS evidence for procedural controls. Controls covered by both sources receive a “defense-in-depth” designation — stronger evidence for auditors.

Why this matters

A Veracode scan tells you about 47 vulnerabilities. It says nothing about whether you have RBAC, whether your audit logging works, or whether your encryption meets NIST standards. You still need a human to manually inventory implemented controls for every FedRAMP assessment. AEGIS produces both reports in one pass. What’s broken and what’s working. The vulnerability findings feed remediation. The capability findings feed compliance evidence. Together they feed Arena certification.


Compliance Mapping

Twelve frameworks, unified mapping

Every finding maps to controls across all twelve frameworks simultaneously. Context-aware risk adjustment factors reachability, exposure, and compensating controls into the final score.

NIST SP 800-53 Rev 5
Full catalog with FedRAMP baselines
ISO/IEC 27001:2022
Annex A controls with SOC 2 bridge
SOC 2 Type II
Trust Services Criteria mapping
FedRAMP 20x
KSI themes · ConMon automation · POA&M · OSCAL
DoD SRG
IL2 / IL4 / IL5 / IL6 overlay assessment
OWASP Top 10
2021 + API Security 2023
PCI-DSS v4.0
Cardholder data environment controls
HIPAA
Security Rule technical safeguards
SEC / FINRA
Reg SCI · Reg S-P · Rule 3110 · Rule 4370
CMMC 2.0 / NIST 800-171
DoD CUI protection · 110 requirements · Levels 1–3
EU DORA (Regulation 2022/2554)
Mandatory since Jan 2025 · 5 pillars: ICT risk, incident management, resilience testing, third-party risk, information sharing
EU AI Act (Regulation 2024/1689)
Arts 9–17 conformity assessment · Risk management · Technical documentation · High-risk AI system compliance

Output Formats

35+ signed reports, one scan

No other scanning tool produces OSCAL, DORA pillar mapping, VEX, and CycloneDX SBOM from a single pass over the same provenance chain. Every report is signed, timestamped, and independently verifiable. Group them by who reads them:

Security — for engineering and AppSec
SARIF 2.1.0 · STRIDE · taint flow HTML · IAM analysis · WAF rules (3 formats) · DAST · IR playbooks (NIST 800-61)
Compliance — for auditors and 3PAOs
OSCAL 1.1.2 (SSP / AR / POA&M / component def) · DORA Pillar I–V · ISO 27001 · NIST CSF 2.0 · VEX · SBOM (CycloneDX + SPDX) · FedRAMP ConMon
Operations — for platform and SRE
Tech debt · bounded context · env / IaC divergence · dependency accuracy · API surface · resource leaks
Intelligence — for leadership and BD
Cybersecurity scoring (6 domains, 9 frameworks) · 12-framework compliance map · evidence bundle · M&A due diligence · trend analysis
35+
Report formats
12
Frameworks
1
Scan
0
LLM in pipeline

Cryptographic Trust

Every action hash-chained

Not just a scan report. A verifiable evidence chain. Every pipeline action produces a hash-chained provenance entry with algorithm-agile cryptography. SLSA-compatible export.

Algorithm-Agile
PQC-Ready Cryptography
SHA-256 default. SHAKE-256 (PQC) via config switch. Mixed-algorithm chains supported during migration.
Governance
Consequence Tier Gating
T1–T4 gating with PASS / HOLD / DENY / ESCALATE. Every agent action checked against tier authorization.
Observability
13-Channel Diagnostics
Zero-overhead tracing via Node.js diagnostics_channel. Pipeline, stage, wave, gate, and provenance spans.
Integrity
HMAC-Signed Intent Capsules
Mandate tracking with drift detection. If an agent deviates from its approved scope, the capsule detects it.
Provenance
Append-Only Hash Chain — SLSA v1 Compatible
Every pipeline action—scan, triage, exploit proof, patch, deployment—produces a hash-chained entry. The chain is independently verifiable. 35+ report formats across security, compliance, operations, and intelligence categories — all derived from the same provenance chain: SARIF 2.1.0, OSCAL 1.1.2, DORA Pillar I–V, NIST CSF 2.0, ISO 27001, CycloneDX + SPDX SBOM, VEX, SLSA, and code gen invariants.
Deterministic Engine
No LLM in the pipeline.
The AEGIS scan engine is deterministic Rust code. Your source code never touches an AI model during scanning, analysis, or evidence generation.

How It Works

Three stages, one funnel

AEGIS is the entry point. Stage 0 is free and runs locally. Stages 1 and 2 unlock when you need audit-grade evidence or third-party certification.

0
Free Scan — readiness preview
npx @raknor/aegis scan ./your-project — severity histogram, first 50 findings, and traffic-light pass / warn / fail against 8 frameworks. Runs locally. No signup. No upload.
1
Enhanced Scan — full evidence
Two paths: (A) ingest your ISMS / policy documents via MindMeld to add procedural controls, or (B) license the full scan for unredacted findings, AST taint analysis, OSCAL packages, DORA pillar mapping, SBOM, VEX, and the rest of the 35+ report formats.
2
Prove It — Arena certification
Hand the signed evidence bundle to arena.raknor.ai for third-party governance + cybersecurity certification. The same provenance chain that produced the scan produces the certification record.

For Channel Partners

White-label as a first-class feature

AEGIS rebrands. Partners deploy the same engine under their own company name, logo, colors, and product name. Your prospects never need to know what AEGIS is — they see your brand and get a diagnostic from their own code.

When a prospect runs a white-labeled scan, the structured output (framework percentages, severity counts, missing capabilities) is exportable to the partner's CRM as structured fields. This is not a PDF attachment — it is lead qualification data that pre-scopes the engagement.

"Infusion Points FedRAMP Readiness Scan"
GovCloud partner qualifying federal prospects
"[Partner] HIPAA Compliance Check"
Healthcare vertical SaaS
"[Partner] DORA Readiness Assessment"
EU financial services
CRM-exportable lead data
Framework % · severity counts · missing capabilities — structured fields, not PDFs
A sales weapon with a compliance engine behind it
Cost per scan is effectively zero. The free preview runs locally on the prospect's machine. The licensed scan runs on theirs or yours. Either way, you start every conversation with a diagnostic instead of a deck.

Under the Hood — for engineers

Seven governed stages, one command

Every stage runs under consequence-tier gating (T1 reversible read → T4 external side effect). Each action produces a hash-chained provenance entry. The chain is append-only and independently verifiable.

T1
Recon
AST parsing, call graph construction, cross-file dependency mapping
agent: Athena's Owl
T2
Discovery
Parallel SAST, DAST, taint analysis, fuzzing — four agents in parallel
agents: Alecto (fuzz) · Megaera (taint) · Tisiphone (SCA) · Arachne (DAST)
T1
Triage
CVSS v3.1 scoring, deduplication, CISA KEV cross-reference, EPSS enrichment
agent: Dikē
T3
Exploit Proof
Controlled PoC generation in sandboxed execution
agent: Ares
T3
Synthesis
Patch generation with semantic constraints — fix the vuln, preserve behavior
agent: Hephaestus
T2
Verification
Heuristic + dynamic test execution against patched code
agent: Athena's Shield
T4
Deployment
Human-approved production deployment with SARIF + OSCAL evidence
agent: Hermes · requires human approval

Validated

Tested against real benchmarks

Not hypothetical capabilities. Measured results against industry-standard test suites and production codebases.

NIST Juliet Test Suite 28,404 flawed C/C++ files 100% detection
OSCAL schema validation NIST v1.1.2 — SSP, Assessment Results, POA&M All 3 pass
Cross-framework consistency Same findings across 12 framework mappings Verified
Production codebase scan 921 files, all evidence packages generated 28 findings
Round-trip invariant test Generated invariants fed back into security review New CWE-78 found

Cybersecurity Certification Failures

What triggers certification denial

AEGIS findings feed directly into the Raknor certification decision. The following cybersecurity conditions result in certification denial regardless of governance score:

×
Reachable critical vulnerability
A critical-severity vulnerability (CVSS 9.0+) with a proven exploitation path from an external entry point to the vulnerable code.
×
Exploitable injection path
Unsanitized user input reaches a sensitive sink (SQL, command execution, file system, LDAP) through a verified taint flow.
×
Exposed secrets in source
API keys, credentials, or tokens found in source code, configuration files, or committed to version control.
×
Known-vulnerable dependency (exploitable)
A dependency with a known CVE where the vulnerable function is reachable from the application's execution path.

Cybersecurity findings are deterministic. A system with a reachable critical vulnerability cannot be Raknor certified, regardless of its governance behavior score.


Run a free scan right now

Traffic-light readiness against 8 frameworks in seconds. Runs locally. No signup. No upload. No runtime cost.
Need OSCAL, DORA, or audit-grade evidence? Request licensed access.

Request Licensed Access
Free readiness preview:
npx @raknor/aegis scan ./your-project

Full code scan with SARIF + OSCAL evidence (licensed):
npx @raknor/aegis run ./your-project --sarif --threat-intel