ScanRook Roadmap
A transparent view of what we have shipped, what we are actively building, what is planned next, and what we have intentionally deferred with reasoning. Updated as priorities change.
Shipped
Features that are live and available in the current release.
OSV, NVD, Red Hat OVAL vulnerability enrichment
ShippedBatch queries against the OSV API, NVD CPE matching, and Red Hat OVAL XML filtering. Three complementary data sources for broad CVE coverage.
EPSS exploit prediction scoring
ShippedEvery finding is annotated with its EPSS probability and percentile from the FIRST.org EPSS feed, enabling exploit-likelihood-based prioritization.
CISA KEV (Known Exploited Vulnerabilities) tagging
ShippedFindings matching the CISA Known Exploited Vulnerabilities catalog are flagged automatically, surfacing actively exploited CVEs for immediate attention.
Container scanning
ShippedFull extraction and inventory of container image tars with support for RPM, APK, dpkg, npm, pip, Go modules, and more. OCI manifest and layer ordering handled automatically.
Binary scanning (ELF, PE, Mach-O)
ShippedStatic analysis of compiled binaries via goblin with memory-mapped I/O. Extracts linked libraries, Go build info, and Rust panic strings for vulnerability correlation.
SBOM import (CycloneDX, SPDX, Syft JSON)
ShippedImport existing SBOMs in CycloneDX, SPDX, and Syft JSON formats. Components are enriched through the full vulnerability pipeline automatically.
SBOM diff
ShippedCompare two SBOM snapshots to identify added, removed, and changed components. Useful for tracking supply chain drift across releases.
Multi-distro support
ShippedAlmaLinux, Rocky Linux, SUSE, Fedora, Amazon Linux, Oracle Linux, Chainguard, and Wolfi. Distro-specific advisory filtering reduces false positives.
Confidence tiers (installed-state-first scanning)
ShippedFindings are classified as ConfirmedInstalled or HeuristicUnverified based on evidence source. Installed-state packages are prioritized over heuristic matches.
Docker registry scanning (OCI-compliant)
ShippedConnect any OCI-compliant registry (Docker Hub, GHCR, ECR, GCR, self-hosted). Browse repositories and tags, scan images on demand, and manage registry credentials per organization with AES-256-GCM encryption.
Prometheus + Grafana monitoring dashboards
ShippedScanner and worker metrics exposed via Prometheus endpoints. Pre-built Grafana dashboards for scan throughput, queue depth, enrichment latency, and error rates.
Centralized logging (Loki)
ShippedLogs from all services aggregated into Grafana Loki via Promtail with unified search, alerting, and correlation across the UI, Dispatcher, and Scanner.
Org and team RBAC
ShippedBitwise role-based access control with eight granular roles from Viewer to Org Owner. API key authentication with scoped permissions and per-org billing quota enforcement.
Real-time scan progress (SSE)
ShippedLive scan progress streaming via PostgreSQL NOTIFY/LISTEN and Server-Sent Events. No polling — the browser receives stage updates, severity counts, and SBOM status in real time.
Multi-page documentation
ShippedStructured documentation covering CLI quickstart, SBOM guide, CI/CD integration, architecture, data sources, benchmarks, FAQ, and self-hosted deployment.
Expanded benchmark matrix (v1.14.2)
ShippedBenchmarks across 10 container images comparing ScanRook against Trivy and Grype. Published with warm-cache times, finding counts, and methodology transparency.
Tiered vulnerability database (Free vs Pro)
ShippedTwo pre-compiled vulnerability databases: a free tier with OSV + basic NVD (comparable to Trivy/Grype), and a paid tier adding EPSS, CISA KEV, Red Hat OVAL, confidence tiers, and distro tracker cross-references.
Per-developer pricing with API key enforcement
ShippedCLI authenticates via API key to determine plan tier. Free users get OSV-only enrichment. Paid plans unlock full multi-source enrichment, JSON output, and the premium vulnerability database.
Stripe billing integration
ShippedPayment processing for Developer, Team, and Enterprise tiers. Per-developer pricing with self-serve checkout via Stripe, subscription management, and usage-based quota enforcement.
GitHub Action with PR comments and policy gates
ShippedOfficial GitHub Action that runs ScanRook in CI/CD pipelines. Posts findings as PR review comments with severity badges, and can block merges based on configurable policy thresholds. Supports Docker image and artifact scanning.
Scheduled recurring scans
ShippedCron-based scan schedules for registry images. Automatically re-scan images on a configurable cadence and alert on newly disclosed vulnerabilities. Managed via the dashboard with inline editing.
Slack and webhook notifications
ShippedConfigurable notification channels that fire on scan completion. Supports Slack, Discord, generic HTTP webhooks with HMAC signing, and email. Test notifications from the dashboard.
Compliance report generation (SOC 2, ISO 27001, FedRAMP)
ShippedExport audit-ready CSV and JSON reports with framework-specific headers. SOC 2 includes CC7.1 controls, ISO 27001 includes A.12.6 annex references, FedRAMP uses POA&M format with NIST categories.
Vulnerability trend dashboard
ShippedHistorical stacked bar charts showing severity distribution over time. Summary cards for total scans, average findings, trend direction, and most-scanned images.
License risk scoring and detection
ShippedExtracts licenses from RPM headers, APK metadata, dpkg copyright files, npm package.json, pip METADATA, and Cargo.toml. Classifies 22+ SPDX license types with risk tiers (Critical/High/Medium/Low/None). Flags copyleft and non-commercial licenses.
SBOM policy gates in web platform
ShippedConfigurable policy engine in the dashboard with inline rule builder. Supports severity thresholds, license blocklists, package blocklists, and scan age rules. Evaluate policies against any completed scan.
Kubernetes cluster scanning (CLI)
ShippedThe `scanrook k8s` subcommand connects to a cluster via kubeconfig, discovers all running workloads, pulls their container images, and scans each one. Reports per-image findings with workload mapping.
Kubernetes operator with admission webhook
ShippedGo-based operator that watches Deployments, StatefulSets, and DaemonSets. Creates ImageScan CRDs for each container image. Optional validating admission webhook blocks pods with critical vulnerabilities. Installable via Helm chart.
Cross-version SBOM diff
ShippedSBOM diff now compares across versions of the same image (e.g., myapp:v1.2 vs myapp:v1.3) instead of requiring exact tag matches. Shows added, removed, and changed packages between builds.
Sidebar navigation with icons
ShippedCollapsible left sidebar with grouped sections (Scanning, Security, Infrastructure, Organization, Admin). SVG icons for each item. Mobile overlay with backdrop. Collapse state persists via localStorage.
In Progress
Actively being built. Expected in upcoming releases.
License fingerprint database
In ProgressBuilding a code fingerprint database from the top 100K packages per ecosystem (npm, PyPI, Maven, Go, Cargo). MinHash signatures for fuzzy snippet matching to detect copied/modified open source code and identify its license.
ClearlyDefined API integration
In ProgressFallback license lookup via the ClearlyDefined API for packages where local metadata extraction doesn't provide license info (Go modules, some pip packages, Maven JARs).
License obligation tracking
In ProgressMap each SPDX license to its specific legal obligations: attribution requirements, source disclosure, patent grants, network use triggers. Track compliance status per component.
License conflict detection
In ProgressRule engine that identifies incompatible license combinations in a project's dependency tree (e.g., GPL + proprietary, AGPL in SaaS without disclosure).
Planned
Committed to the roadmap. Work has not started yet.
Source code repository scanning
PlannedAccept git repo URLs or zip uploads. Parse all dependency manifests (package.json, requirements.txt, go.mod, Cargo.toml, pom.xml). Resolve full dependency trees including transitive deps. License detection for every dependency.
License file scanning (LICENSE/COPYING/NOTICE)
PlannedScan extracted containers and source repos for LICENSE, COPYING, and NOTICE files. Parse both machine-readable DEP-5 format and free-text license declarations using ScanCode-compatible patterns.
Legal review workflow
PlannedDashboard workflow for reviewing and approving open source components. Lawyers and compliance officers can approve, reject, or flag packages. Full audit trail of decisions.
Binary component fingerprinting
PlannedHash binary segments (ELF sections, PE resources) and match against a database of known open source components to identify embedded libraries and their licenses.
Vulnerability remediation guidance
PlannedActionable fix recommendations per finding including the minimum patched version, upgrade commands, and links to vendor advisories.
Scan comparison view
PlannedSide-by-side diff of two scan results showing new, resolved, and unchanged findings between any two scans. Works across versions, tags, and time periods.
SUSE Security OVAL integration
PlannedNative integration with SUSE Security OVAL feeds for SLES and openSUSE. Distro-specific advisory filtering for SUSE-based container images.
Oracle Linux Security OVAL integration
PlannedDirect consumption of Oracle Linux OVAL data for accurate RPM advisory matching on Oracle Linux containers.
Considered / Deferred
Evaluated and intentionally deferred. Each item includes our reasoning.
Reachability analysis
DeferredDetermine whether a vulnerable dependency is actually reachable in the application's call graph, reducing false positives from unused transitive dependencies.
Requires language-specific static analysis (call graph resolution) per ecosystem. This is a multi-month research project. Snyk and Semgrep each have dedicated teams on this. We will evaluate integrating existing open-source call graph tools (e.g., Google's deps.dev) before building from scratch.
Auto-fix pull requests
DeferredAutomatically generate PRs that bump vulnerable dependencies to the minimum patched version.
Requires language-specific dependency resolution and lock file manipulation per ecosystem (npm, pip, Go, Maven, Cargo, etc.). Dependabot and Renovate already do this well. We will explore integration with these tools rather than building a competing implementation.
IDE plugins (VS Code, IntelliJ)
DeferredReal-time vulnerability scanning in the editor with inline severity annotations and quick-fix suggestions.
Separate product surface with its own release cycle and maintenance burden. Prioritizing CI/CD integration first as it covers more workflows with less effort.
Secrets detection
DeferredScan artifacts for hardcoded API keys, tokens, passwords, and other sensitive credentials.
Separate scanning engine from vulnerability analysis. Tools like TruffleHog, Gitleaks, and Semgrep Secrets already handle this well. May integrate as an optional module in the future.
GitLab native integration
DeferredGitLab CI integration with merge request comments and security dashboard reporting.
Prioritizing GitHub Action first due to larger market share. GitLab CI support planned after GitHub Action is stable.
SBOM signature verification
DeferredCryptographic verification of SBOM provenance and integrity.
No widely adopted standard exists yet. Watching the Sigstore/cosign ecosystem for maturity.
Interactive terminal UI (TUI)
DeferredA rich terminal interface for interactive scan monitoring and result browsing.
Nice-to-have cosmetic improvement. Structured NDJSON progress format already integrates well with CI/CD pipelines.
Multi-arch Docker builds (ARM64)
DeferredPre-built container images for ARM64 in addition to AMD64.
Useful but not blocking core functionality. ARM64 builds planned for a future release.