The Evidence Engine

See your compliance posture
in seconds.

One scan. 12 frameworks. 45 signed, machine-readable report formats. Traffic-light pass / warn / fail readiness against FedRAMP, DORA, ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST CSF, and CMMC — from your own code, on your own machine.

Free scan — full Rust engine, 50-finding cap, runs locally:
npx @raknor/aegis scan ./your-project
Unlock all findings + 45 report formats with a product key:
AEGIS_PRODUCT_KEY=your-key npx @raknor/aegis scan ./your-project --all
Same engine, same binary. The key unlocks findings and formats, not a different scanner.
No signup. No upload. Nothing leaves your machine.

Autonomous Cyber Reasoning

Find. Prove. Fix. Verify. Ship. Autonomously.

Most security tools find vulnerabilities. AEGIS finds them, proves they're exploitable, generates the patch, verifies the patch preserves behavior, and produces signed evidence at every step. Seven governed agent stages, one command, full provenance chain.

T1
Recon
AST parsing, call graph construction, dependency mapping
Athena's Owl
T2
Discovery
Parallel SAST, DAST, taint analysis, fuzzing
Alecto · Megaera · Tisiphone · Arachne
T1
Triage
CVSS scoring, dedup, CISA KEV cross-reference, EPSS enrichment
Dikē
T3
Exploit Proof
Controlled PoC generation in sandboxed execution
Ares
T3
Synthesis
Patch generation with semantic constraints
Hephaestus
T2
Verification
Heuristic + dynamic test execution against patched code
Athena's Shield
T4
Deployment
Production deployment with human approval
Hermes · requires human approval
The pipeline is autonomous; the gates are not.
No stage advances without consequence-tier authorization, and every gate decision is itself a hash-chained provenance entry. This is what differentiates AEGIS from scanners: a system that doesn’t just tell you what’s broken, it proves it, fixes it, and ships the evidence — under governance you can audit.

Governance

Every action gated. Every gate signed.

AEGIS doesn’t run as one process; it runs as seven, each operating under its own consequence-tier authorization. A T3 exploit-proof attempt cannot execute without sandbox containment. A T4 deployment cannot proceed without human approval. The system cannot escalate its own authority — every tier transition produces a hash-chained provenance entry that auditors can independently verify.

T1 — Reversible reads
AST parsing, call graph queries, dependency lookups. No side effects, no execution. Default-authorized.
T2 — Sandboxed analysis
Taint analysis, fuzzing, dynamic test execution against patched code. Side effects contained to the sandbox.
T3 — Controlled exploit & synthesis
PoC generation, patch synthesis. Operates against the codebase under analysis but cannot execute against production.
T4 — External side effects
Deployment, evidence-bundle publication. Requires human approval and produces a signed provenance entry at the gate.
The gates are why AEGIS can be autonomous and trustworthy in the same sentence. Without them, you have an AI writing code in production. With them, you have a governed pipeline where every step is verifiable and every authority transition is signed.

Free Compliance Diagnostic

Traffic lights against nine frameworks

The free npx scan runs the full Rust engine — tree-sitter AST parsing, cross-file taint analysis, call graph construction — and produces a readiness indicator for nine compliance frameworks. Pass / warn / fail status, percentage toward each baseline, and the gap that's blocking it. Capped at 50 findings.

The free scan covers nine frameworks at the traffic-light level. A product key unlocks the full 12-framework unified mapping, including FedRAMP 20x, DoD SRG, SEC/FINRA, and EU AI Act — plus unlimited findings and the full 45 report format set (OSCAL packages, DORA pillar mapping, FedRAMP ConMon, SBOM, evidence bundles).

FedRAMP High / Moderate
% toward baseline · pass / warn / fail
SOC 2 Type II
Trust Services Criteria readiness
ISO/IEC 27001:2022
Annex A control gap analysis
PCI-DSS v4.0
Cardholder data environment readiness
HIPAA
Security Rule technical safeguards
DORA (EU)
In force since January 2025 · 5 pillar readiness
NIST CSF 2.0
Govern / Identify / Protect / Detect / Respond
CMMC Level 2
DoD CUI · 110 NIST 800-171 requirements
The upgrade hinge
"You are 34% toward FedRAMP Moderate. Here's what's missing and how to fix it."
The free scan finds the issues with the full engine (AST, taint, call graph). A product key unlocks all findings and produces the OSCAL SSP, POA&M, ConMon package, and DORA pillar mapping that closes the gap — the artifacts an auditor or 3PAO actually consumes.

Language Support

14 languages, tree-sitter AST

Not regex. Not heuristics. Full abstract syntax tree parsing via tree-sitter, with inter-procedural call graph construction and cross-file taint analysis.

JavaScript
tree-sitter · cross-file taint
TypeScript
tree-sitter · cross-file taint
Python
tree-sitter · cross-file taint
Java
tree-sitter · cross-file taint
Go
tree-sitter · cross-file taint
C#
tree-sitter · namespace resolution
C / C++
tree-sitter · CWE-120/134/170
Rust
tree-sitter · cross-file taint
Kotlin
tree-sitter · cross-file taint
Swift
tree-sitter · cross-file taint
PHP
tree-sitter · cross-file taint
Bash
tree-sitter · injection detection
HCL / Terraform
tree-sitter · IAM misconfig
+ Extensible
Language registry is open

Scanning Capabilities

Six scanner types, 43 analysis modules, one unified output

Every scanner produces findings in a normalized format. SARIF 2.1.0 output is standard. Cross-file taint analysis traces data flow across module boundaries. 43 analysis modules across the six scanner types, with six graph modules providing call-graph and taint reachability.

SAST
Static Analysis
AST-based pattern detection. Cross-file taint analysis with C# namespace resolution. Logic consistency checking (6 CWE categories).
SCA
Dependency Scanning
CVE lookup across npm, NuGet, PyPI, Maven. Typosquat detection via Levenshtein distance. SBOM generation.
DAST
Dynamic Analysis
Runtime security scanning. XSS, SQLi, CORS, security headers, TLS configuration, rate limit verification.
Secrets
Secret Detection
High-entropy string detection and pattern matching for API keys, tokens, credentials in source and config.
Cloud
Multi-Cloud Security
AWS, Azure, and GCP misconfiguration scanning. IAM, storage, network, encryption posture assessment.
Threat Intel
CISA KEV + EPSS + NVD
Cross-reference findings against CISA Known Exploited Vulnerabilities. Batch EPSS scoring. NVD CVE enrichment for high-risk findings.
14
Languages
115
CWE Patterns
43
Analysis Modules
6
Graph Modules

What's Right, Not Just What's Wrong

Security tools find problems. AEGIS also proves controls.

Every SAST tool on the market tells you what’s broken. FedRAMP, SOC 2, and ISO 27001 also require evidence of what’s implemented — what controls are present, what policies are enforced, what security architecture is in place. That evidence doesn’t exist in a vulnerability report.

AEGIS detects implemented security controls directly from your codebase. 68 detection patterns across 12 NIST 800-53 control families. Each detection produces an OSCAL control implementation statement — the exact artifact auditors and 3PAOs consume.

68
Detection patterns
12
NIST 800-53 control families
101
NIST controls from ISMS ingestion
Control Family What AEGIS Detects
Access Control (AC)RBAC decorators, auth middleware, session management, MFA
Audit & Accountability (AU)Logging frameworks, audit trail writes, CloudTrail integration
Configuration Management (CM)IaC, config validation, change tracking, version pinning
Identification & Auth (IA)Password hashing (bcrypt/argon2), token validation, MFA flows
System & Comms Protection (SC)TLS configuration, AES-256, input sanitization, CORS
System & Info Integrity (SI)Input validation, malware detection, patch management

Plus 6 additional families: Security Assessment (CA), Incident Response (IR), Media Protection (MP), Planning (PL), Risk Assessment (RA), and System Acquisition (SA).

ISMS Document Ingestion

Code scans cover technical controls. Organizational controls — access policies, incident response procedures, training requirements — live in ISMS documents. AEGIS ingests your ISMS markdown and maps 19 policy sections to 101 NIST controls, producing OSCAL statements for procedural evidence that code analysis can’t reach.

The merge logic prefers code evidence (automated, verifiable) and supplements with ISMS evidence for procedural controls. Controls covered by both sources receive a “defense-in-depth” designation — stronger evidence for auditors.

Why this matters

A Veracode scan tells you about 47 vulnerabilities. It says nothing about whether you have RBAC, whether your audit logging works, or whether your encryption meets NIST standards. You still need a human to manually inventory implemented controls for every FedRAMP assessment. AEGIS produces both reports in one pass. What’s broken and what’s working. The vulnerability findings feed remediation. The capability findings feed compliance evidence. Together they feed Arena certification.


Compliance Mapping

Twelve frameworks, unified mapping

Every finding maps to controls across all twelve frameworks simultaneously. Context-aware risk adjustment factors reachability, exposure, and compensating controls into the final score.

Reachability is computed by the call graph and taint analysis, not assumed. A finding in dead code carries a 0.3x multiplier; a finding in vendor dependencies carries 0.0x. The customer sees severity scored against what’s actually reachable in their topology, not against worst-case configuration.

NIST SP 800-53 Rev 5
Full catalog with FedRAMP baselines
ISO/IEC 27001:2022
Annex A controls with SOC 2 bridge
SOC 2 Type II
Trust Services Criteria mapping
FedRAMP 20x
KSI themes · ConMon automation · POA&M · OSCAL
DoD SRG
IL2 / IL4 / IL5 / IL6 overlay assessment
OWASP Top 10
2021 + API Security 2023
PCI-DSS v4.0
Cardholder data environment controls
HIPAA
Security Rule technical safeguards
SEC / FINRA
Reg SCI · Reg S-P · Rule 3110 · Rule 4370
CMMC 2.0 / NIST 800-171
DoD CUI protection · 110 requirements · Levels 1–3
EU DORA (Regulation 2022/2554)
In force since January 2025 · 5 pillars: ICT risk, incident management, resilience testing, third-party risk, information sharing
EU AI Act (Regulation 2024/1689)
Arts 9–17 conformity assessment · Risk management · Technical documentation · High-risk AI system compliance

Output Formats

45 signed reports, one scan

No other scanning tool produces OSCAL, DORA pillar mapping, VEX, and CycloneDX SBOM from a single pass over the same provenance chain. Every report is signed, timestamped, and independently verifiable. Group them by who reads them:

Security — for engineering and AppSec
SARIF 2.1.0 · STRIDE · taint flow HTML · IAM analysis · WAF rules (3 formats) · DAST · IR playbooks (NIST 800-61)
Compliance — for auditors and 3PAOs
OSCAL 1.1.2 (SSP / AR / POA&M / component def) · DORA Pillar I–V · ISO 27001 · NIST CSF 2.0 · VEX · SBOM (CycloneDX + SPDX) · FedRAMP ConMon
Operations — for platform and SRE
Tech debt · bounded context · env / IaC divergence · dependency accuracy · API surface · resource leaks
Intelligence — for leadership and BD
Cybersecurity scoring (6 domains, 9 frameworks) · 12-framework compliance map · evidence bundle · M&A due diligence · trend analysis
45
Report formats
12
Frameworks
1
Scan
0
LLM in pipeline

Cryptographic Trust

Every action hash-chained

Not just a scan report. A verifiable evidence chain. Every pipeline action produces a hash-chained provenance entry with algorithm-agile cryptography. SLSA-compatible export.

Algorithm-Agile
PQC-Ready Cryptography
SHA-256 default. SHAKE-256 (PQC) via config switch. Mixed-algorithm chains supported during migration.
Governance
Consequence Tier Gating
T1–T4 gating with PASS / HOLD / DENY / ESCALATE. Every agent action checked against tier authorization.
Observability
13-Channel Diagnostics
Zero-overhead tracing via Node.js diagnostics_channel. Pipeline, stage, wave, gate, and provenance spans.
Integrity
HMAC-Signed Intent Capsules
Mandate tracking with drift detection. If an agent deviates from its approved scope, the capsule detects it.
Provenance
Append-Only Hash Chain — SLSA v1 Compatible
Every pipeline action—scan, triage, exploit proof, patch, deployment—produces a hash-chained entry. The chain is independently verifiable. 45 report formats across security, compliance, operations, and intelligence categories — all derived from the same provenance chain: SARIF 2.1.0, OSCAL 1.1.2, DORA Pillar I–V, NIST CSF 2.0, ISO 27001, CycloneDX + SPDX SBOM, VEX, SLSA, and code gen invariants.
Deterministic Engine
No LLM in the pipeline.
The AEGIS scan engine is deterministic Rust code. Your source code never touches an AI model during scanning, analysis, or evidence generation.

Licensing Tiers

One engine. Four tiers of evidence.

The Rust engine — AST parsing, taint analysis, call graph, the seven-stage pipeline — is the same in every tier. Higher tiers unlock additional output formats, framework coverage, and operational features. Not a more capable analyzer.

Capability Community Pro Premium Enterprise
Full Rust engine (AST, taint, call graph)
Seven-stage architecture (T1–T2 active; T3–T4 at Pro+)
Consequence-tier gating + provenance
SARIF 2.1.0 + HTML + JSON output
Framework readiness traffic lights (9)
Finding cap 50 Unlimited Unlimited Unlimited
Pro
Auto-fix (14 CWEs) + patch suggestions
Trend analysis (before/after comparison)
Tech debt, bounded context, env divergence
STRIDE threat model, WAF rules (3 formats)
DAST probes, canary injection, resource leaks
Premium
M&A due diligence report
White-label / partner branding
FedRAMP Continuous Monitoring packages
Governed code transformation engine
Enterprise
OSCAL 1.1.2 (SSP, AR, POA&M, component def)
DORA Pillar I–V, ISO 27001, NIST CSF 2.0
VEX, SBOM (CycloneDX + SPDX), scoring
12-framework compliance mapping + gap analysis
Evidence bundle + Arena submission
Infrastructure discovery, ShieldWatch

The engine is constant. The gate is on output. A product key unlocks formats, coverage, and operational features — it does not enable a different scanner.

View pricing →


How It Works

Three stages, one funnel

AEGIS is the entry point. Stage 0 is free and runs locally. Stages 1 and 2 unlock when you need audit-grade evidence or third-party certification.

0
Free Scan — full engine, 50-finding cap
npx @raknor/aegis scan ./your-project — full Rust engine (AST, taint, call graph), severity histogram, first 50 findings, and traffic-light readiness against 9 frameworks. Same binary as Pro and Enterprise. Runs locally. No signup. No upload.
1
Enhanced Scan — full evidence
Two paths: (A) ingest your ISMS / policy documents to add procedural controls, or (B) license the full scan for unredacted findings, AST taint analysis, OSCAL packages, DORA pillar mapping, SBOM, VEX, and the rest of the 45 report formats.
2
Prove It — Arena certification
Hand the signed evidence bundle to arena.raknor.ai for third-party governance + cybersecurity certification. The same provenance chain that produced the scan produces the certification record.

For Channel Partners

White-label as a first-class feature

AEGIS rebrands. Partners deploy the same engine under their own company name, logo, colors, and product name. Your prospects never need to know what AEGIS is — they see your brand and get a diagnostic from their own code.

When a prospect runs a white-labeled scan, the structured output (framework percentages, severity counts, missing capabilities) is exportable to the partner's CRM as structured fields. This is not a PDF attachment — it is lead qualification data that pre-scopes the engagement.

"[Partner] FedRAMP Readiness Scan"
Federal channel partner qualifying GovCloud prospects
"[Partner] HIPAA Compliance Check"
Healthcare vertical SaaS
"[Partner] DORA Readiness Assessment"
EU financial services
CRM-exportable lead data
Framework % · severity counts · missing capabilities — structured fields, not PDFs
A sales weapon with a compliance engine behind it
Cost per scan is effectively zero. The free preview runs locally on the prospect's machine. The licensed scan runs on theirs or yours. Either way, you start every conversation with a diagnostic instead of a deck.

Under the Hood — for engineers

Pipeline detail, one command

1.5M LOC in 40 seconds for a full analysis pass. File scanning throughput peaks at 6.7M LOC in 5 seconds. Delta scans (--changed-only) complete in under one second. The Rust engine runs entirely locally — no source code leaves the machine, no LLM is invoked in the analysis pipeline. The engine is deterministic: same input produces the same output, byte-for-byte, including provenance hashes.

Every stage runs under consequence-tier gating (T1 reversible read → T4 external side effect). Each action produces a hash-chained provenance entry. The chain is append-only and independently verifiable.

T1
Recon
AST parsing, call graph construction, cross-file dependency mapping
agent: Athena's Owl
T2
Discovery
Parallel SAST, DAST, taint analysis, fuzzing — four agents in parallel
agents: Alecto (fuzz) · Megaera (taint) · Tisiphone (SCA) · Arachne (DAST)
T1
Triage
CVSS v3.1 scoring, deduplication, CISA KEV cross-reference, EPSS enrichment
agent: Dikē
T3
Exploit Proof
Controlled PoC generation in sandboxed execution
agent: Ares
T3
Synthesis
Patch generation with semantic constraints — fix the vuln, preserve behavior
agent: Hephaestus
T2
Verification
Heuristic + dynamic test execution against patched code
agent: Athena's Shield
T4
Deployment
Human-approved production deployment with SARIF + OSCAL evidence
agent: Hermes · requires human approval

Validated

Tested against real benchmarks

Not hypothetical capabilities. Measured results against industry-standard test suites and production codebases.

NIST Juliet Test Suite 105K test files · 12.6M LOC · 119 CWE categories Zero categories missed
OSCAL schema validation NIST v1.1.2 — SSP, Assessment Results, POA&M All 3 pass
Cross-framework consistency Same findings across 12 framework mappings Verified
Production codebase scan 921 files, all evidence packages generated 28 findings
Round-trip invariant test Generated invariants fed back into security review New CWE-78 found

Cybersecurity Certification Failures

What triggers certification denial

AEGIS findings feed directly into the Raknor certification decision. The following cybersecurity conditions result in certification denial regardless of governance score:

×
Reachable critical vulnerability
A critical-severity vulnerability (CVSS 9.0+) with a proven exploitation path from an external entry point to the vulnerable code.
×
Exploitable injection path
Unsanitized user input reaches a sensitive sink (SQL, command execution, file system, LDAP) through a verified taint flow.
×
Exposed secrets in source
API keys, credentials, or tokens found in source code, configuration files, or committed to version control.
×
Known-vulnerable dependency (exploitable)
A dependency with a known CVE where the vulnerable function is reachable from the application's execution path.

Cybersecurity findings are deterministic. A system with a reachable critical vulnerability cannot be Raknor certified, regardless of its governance behavior score.


Run the real engine right now

Full Rust engine. AST, taint analysis, call graph. 50-finding cap. Traffic-light readiness against 9 frameworks.
Runs locally. Nothing leaves your machine. A product key unlocks unlimited findings + 45 report formats.

Request a Product Key
Free (50-finding cap, same engine):
npx @raknor/aegis scan ./your-project

With product key (all findings + all reports):
AEGIS_PRODUCT_KEY=your-key npx @raknor/aegis scan ./your-project --all