Product Roadmap

ScanRook Roadmap

A transparent view of what we have shipped, what we are actively building, what is planned next, and what we have intentionally deferred with reasoning. Updated as priorities change.

Status Legend
ShippedIn ProgressPlannedDeferred

Shipped

Features that are live and available in the current release.

OSV, NVD, Red Hat OVAL vulnerability enrichment

Shipped

Batch queries against the OSV API, NVD CPE matching, and Red Hat OVAL XML filtering. Three complementary data sources for broad CVE coverage.

EPSS exploit prediction scoring

Shipped

Every finding is annotated with its EPSS probability and percentile from the FIRST.org EPSS feed, enabling exploit-likelihood-based prioritization.

CISA KEV (Known Exploited Vulnerabilities) tagging

Shipped

Findings matching the CISA Known Exploited Vulnerabilities catalog are flagged automatically, surfacing actively exploited CVEs for immediate attention.

Container scanning

Shipped

Full extraction and inventory of container image tars with support for RPM, APK, dpkg, npm, pip, Go modules, and more. OCI manifest and layer ordering handled automatically.

Binary scanning (ELF, PE, Mach-O)

Shipped

Static analysis of compiled binaries via goblin with memory-mapped I/O. Extracts linked libraries, Go build info, and Rust panic strings for vulnerability correlation.

SBOM import (CycloneDX, SPDX, Syft JSON)

Shipped

Import existing SBOMs in CycloneDX, SPDX, and Syft JSON formats. Components are enriched through the full vulnerability pipeline automatically.

SBOM diff

Shipped

Compare two SBOM snapshots to identify added, removed, and changed components. Useful for tracking supply chain drift across releases.

Multi-distro support

Shipped

AlmaLinux, Rocky Linux, SUSE, Fedora, Amazon Linux, Oracle Linux, Chainguard, and Wolfi. Distro-specific advisory filtering reduces false positives.

Confidence tiers (installed-state-first scanning)

Shipped

Findings are classified as ConfirmedInstalled or HeuristicUnverified based on evidence source. Installed-state packages are prioritized over heuristic matches.

Docker registry scanning (OCI-compliant)

Shipped

Connect any OCI-compliant registry (Docker Hub, GHCR, ECR, GCR, self-hosted). Browse repositories and tags, scan images on demand, and manage registry credentials per organization with AES-256-GCM encryption.

Prometheus + Grafana monitoring dashboards

Shipped

Scanner and worker metrics exposed via Prometheus endpoints. Pre-built Grafana dashboards for scan throughput, queue depth, enrichment latency, and error rates.

Centralized logging (Loki)

Shipped

Logs from all services aggregated into Grafana Loki via Promtail with unified search, alerting, and correlation across the UI, Dispatcher, and Scanner.

Org and team RBAC

Shipped

Bitwise role-based access control with eight granular roles from Viewer to Org Owner. API key authentication with scoped permissions and per-org billing quota enforcement.

Real-time scan progress (SSE)

Shipped

Live scan progress streaming via PostgreSQL NOTIFY/LISTEN and Server-Sent Events. No polling — the browser receives stage updates, severity counts, and SBOM status in real time.

Multi-page documentation

Shipped

Structured documentation covering CLI quickstart, SBOM guide, CI/CD integration, architecture, data sources, benchmarks, FAQ, and self-hosted deployment.

Expanded benchmark matrix (v1.14.2)

Shipped

Benchmarks across 10 container images comparing ScanRook against Trivy and Grype. Published with warm-cache times, finding counts, and methodology transparency.

Tiered vulnerability database (Free vs Pro)

Shipped

Two pre-compiled vulnerability databases: a free tier with OSV + basic NVD (comparable to Trivy/Grype), and a paid tier adding EPSS, CISA KEV, Red Hat OVAL, confidence tiers, and distro tracker cross-references.

Per-developer pricing with API key enforcement

Shipped

CLI authenticates via API key to determine plan tier. Free users get OSV-only enrichment. Paid plans unlock full multi-source enrichment, JSON output, and the premium vulnerability database.

Stripe billing integration

Shipped

Payment processing for Developer, Team, and Enterprise tiers. Per-developer pricing with self-serve checkout via Stripe, subscription management, and usage-based quota enforcement.

GitHub Action with PR comments and policy gates

Shipped

Official GitHub Action that runs ScanRook in CI/CD pipelines. Posts findings as PR review comments with severity badges, and can block merges based on configurable policy thresholds. Supports Docker image and artifact scanning.

Scheduled recurring scans

Shipped

Cron-based scan schedules for registry images. Automatically re-scan images on a configurable cadence and alert on newly disclosed vulnerabilities. Managed via the dashboard with inline editing.

Slack and webhook notifications

Shipped

Configurable notification channels that fire on scan completion. Supports Slack, Discord, generic HTTP webhooks with HMAC signing, and email. Test notifications from the dashboard.

Compliance report generation (SOC 2, ISO 27001, FedRAMP)

Shipped

Export audit-ready CSV and JSON reports with framework-specific headers. SOC 2 includes CC7.1 controls, ISO 27001 includes A.12.6 annex references, FedRAMP uses POA&M format with NIST categories.

Vulnerability trend dashboard

Shipped

Historical stacked bar charts showing severity distribution over time. Summary cards for total scans, average findings, trend direction, and most-scanned images.

License risk scoring and detection

Shipped

Extracts licenses from RPM headers, APK metadata, dpkg copyright files, npm package.json, pip METADATA, and Cargo.toml. Classifies 22+ SPDX license types with risk tiers (Critical/High/Medium/Low/None). Flags copyleft and non-commercial licenses.

SBOM policy gates in web platform

Shipped

Configurable policy engine in the dashboard with inline rule builder. Supports severity thresholds, license blocklists, package blocklists, and scan age rules. Evaluate policies against any completed scan.

Kubernetes cluster scanning (CLI)

Shipped

The `scanrook k8s` subcommand connects to a cluster via kubeconfig, discovers all running workloads, pulls their container images, and scans each one. Reports per-image findings with workload mapping.

Kubernetes operator with admission webhook

Shipped

Go-based operator that watches Deployments, StatefulSets, and DaemonSets. Creates ImageScan CRDs for each container image. Optional validating admission webhook blocks pods with critical vulnerabilities. Installable via Helm chart.

Cross-version SBOM diff

Shipped

SBOM diff now compares across versions of the same image (e.g., myapp:v1.2 vs myapp:v1.3) instead of requiring exact tag matches. Shows added, removed, and changed packages between builds.

Sidebar navigation with icons

Shipped

Collapsible left sidebar with grouped sections (Scanning, Security, Infrastructure, Organization, Admin). SVG icons for each item. Mobile overlay with backdrop. Collapse state persists via localStorage.

In Progress

Actively being built. Expected in upcoming releases.

License fingerprint database

In Progress

Building a code fingerprint database from the top 100K packages per ecosystem (npm, PyPI, Maven, Go, Cargo). MinHash signatures for fuzzy snippet matching to detect copied/modified open source code and identify its license.

ClearlyDefined API integration

In Progress

Fallback license lookup via the ClearlyDefined API for packages where local metadata extraction doesn't provide license info (Go modules, some pip packages, Maven JARs).

License obligation tracking

In Progress

Map each SPDX license to its specific legal obligations: attribution requirements, source disclosure, patent grants, network use triggers. Track compliance status per component.

License conflict detection

In Progress

Rule engine that identifies incompatible license combinations in a project's dependency tree (e.g., GPL + proprietary, AGPL in SaaS without disclosure).

Planned

Committed to the roadmap. Work has not started yet.

Source code repository scanning

Planned

Accept git repo URLs or zip uploads. Parse all dependency manifests (package.json, requirements.txt, go.mod, Cargo.toml, pom.xml). Resolve full dependency trees including transitive deps. License detection for every dependency.

License file scanning (LICENSE/COPYING/NOTICE)

Planned

Scan extracted containers and source repos for LICENSE, COPYING, and NOTICE files. Parse both machine-readable DEP-5 format and free-text license declarations using ScanCode-compatible patterns.

Legal review workflow

Planned

Dashboard workflow for reviewing and approving open source components. Lawyers and compliance officers can approve, reject, or flag packages. Full audit trail of decisions.

Binary component fingerprinting

Planned

Hash binary segments (ELF sections, PE resources) and match against a database of known open source components to identify embedded libraries and their licenses.

Vulnerability remediation guidance

Planned

Actionable fix recommendations per finding including the minimum patched version, upgrade commands, and links to vendor advisories.

Scan comparison view

Planned

Side-by-side diff of two scan results showing new, resolved, and unchanged findings between any two scans. Works across versions, tags, and time periods.

SUSE Security OVAL integration

Planned

Native integration with SUSE Security OVAL feeds for SLES and openSUSE. Distro-specific advisory filtering for SUSE-based container images.

Oracle Linux Security OVAL integration

Planned

Direct consumption of Oracle Linux OVAL data for accurate RPM advisory matching on Oracle Linux containers.

Considered / Deferred

Evaluated and intentionally deferred. Each item includes our reasoning.

Reachability analysis

Deferred

Determine whether a vulnerable dependency is actually reachable in the application's call graph, reducing false positives from unused transitive dependencies.

Why deferred

Requires language-specific static analysis (call graph resolution) per ecosystem. This is a multi-month research project. Snyk and Semgrep each have dedicated teams on this. We will evaluate integrating existing open-source call graph tools (e.g., Google's deps.dev) before building from scratch.

Auto-fix pull requests

Deferred

Automatically generate PRs that bump vulnerable dependencies to the minimum patched version.

Why deferred

Requires language-specific dependency resolution and lock file manipulation per ecosystem (npm, pip, Go, Maven, Cargo, etc.). Dependabot and Renovate already do this well. We will explore integration with these tools rather than building a competing implementation.

IDE plugins (VS Code, IntelliJ)

Deferred

Real-time vulnerability scanning in the editor with inline severity annotations and quick-fix suggestions.

Why deferred

Separate product surface with its own release cycle and maintenance burden. Prioritizing CI/CD integration first as it covers more workflows with less effort.

Secrets detection

Deferred

Scan artifacts for hardcoded API keys, tokens, passwords, and other sensitive credentials.

Why deferred

Separate scanning engine from vulnerability analysis. Tools like TruffleHog, Gitleaks, and Semgrep Secrets already handle this well. May integrate as an optional module in the future.

GitLab native integration

Deferred

GitLab CI integration with merge request comments and security dashboard reporting.

Why deferred

Prioritizing GitHub Action first due to larger market share. GitLab CI support planned after GitHub Action is stable.

SBOM signature verification

Deferred

Cryptographic verification of SBOM provenance and integrity.

Why deferred

No widely adopted standard exists yet. Watching the Sigstore/cosign ecosystem for maturity.

Interactive terminal UI (TUI)

Deferred

A rich terminal interface for interactive scan monitoring and result browsing.

Why deferred

Nice-to-have cosmetic improvement. Structured NDJSON progress format already integrates well with CI/CD pipelines.

Multi-arch Docker builds (ARM64)

Deferred

Pre-built container images for ARM64 in addition to AMD64.

Why deferred

Useful but not blocking core functionality. ARM64 builds planned for a future release.