freshcrate
Home > MCP Servers > agent-bom

agent-bom

Open security scanner for AI supply chain: agents, MCP, containers, cloud, GPU, and runtime with blast-radius analysis.

Description

Open security scanner for AI supply chain: agents, MCP, containers, cloud, GPU, and runtime with blast-radius analysis.

README

agent-bom

BuildPyPIDockerLicenseOpenSSF ScorecardOpen security scanner for AI supply chain β€” agents, MCP servers, packages, containers, cloud, GPU, and runtime.

Every CVE in your AI stack is a credential leak waiting to happen. agent-bom follows the chain end-to-end and tells you exactly which fix collapses it.

agent-bom blast-radius drilldown β€” package β†’ CVE β†’ MCP server β†’ agent β†’ credentials β†’ tools

CVE-2025-1234  (CRITICAL Β· CVSS 9.8 Β· CISA KEV)
  |── better-sqlite3@9.0.0  (npm)
       |── sqlite-mcp  (MCP Server Β· unverified Β· root)
            |── Cursor IDE  (Agent Β· 4 servers Β· 12 tools)
            |── ANTHROPIC_KEY, DB_URL, AWS_SECRET  (Credentials exposed)
            |── query_db, read_file, write_file, run_shell  (Tools at risk)

 Fix: upgrade better-sqlite3 β†’ 11.7.0

Blast radius is the core idea: CVE -> package -> MCP server -> agent -> credentials -> tools. CWE-aware impact keeps a DoS from being reported like credential compromise.

agent-bom agents --demo --offline

The demo uses a curated sample so the output stays reproducible across releases. Every CVE shown is a real OSV/GHSA match against a genuinely vulnerable package version β€” no fabricated findings (locked in by tests/test_demo_inventory_accuracy.py). For a real scan, run agent-bom agents, or add -p . to fold project manifests and lockfiles into the same result.

agent-bom terminal demo β€” one CLI run produces blast radius, remediation, and SBOM

Pick your entrypoint

Goal Run What you get
Find what is installed and reachable agent-bom agents -p . Agent discovery, MCP mapping, project dependency findings, blast radius
Turn findings into a fix plan agent-bom agents -p . --remediate remediation.md Prioritized remediation with fix versions and reachable impact
Check a package before install agent-bom check flask@2.2.0 --ecosystem pypi Machine-readable pre-install verdict
Scan a container image agent-bom image nginx:latest OS and package CVEs with fixability
Audit IaC or cloud posture agent-bom iac Dockerfile k8s/ infra/main.tf Misconfigurations, manifest hardening, optional live cluster posture
Review findings in a persistent graph agent-bom serve API plus bundled local UI on one machine; Kubernetes and Compose split the API image (agentbom/agent-bom) from the browser UI image (agentbom/agent-bom-ui)
Inspect live MCP traffic agent-bom proxy "<server command>" Inline runtime inspection, detector chaining, response/argument review

Quick start

pip install agent-bom                  # CLI
# pipx install agent-bom               # isolated global install
# uvx agent-bom --help                 # ephemeral run

agent-bom agents                              # discover + scan local AI agents and MCP servers
agent-bom agents -p .                         # add project lockfiles + manifests
agent-bom check flask@2.0.0 --ecosystem pypi  # pre-install CVE gate
agent-bom image nginx:latest                  # container image scan
agent-bom iac Dockerfile k8s/ infra/main.tf   # IaC scan, optionally `--k8s-live`

After the first scan:

agent-bom agents -p . --remediate remediation.md                  # fix-first plan
agent-bom agents -p . --compliance-export fedramp -o evidence.zip # tamper-evident evidence bundle
pip install 'agent-bom[ui]' && agent-bom serve                    # API + bundled local UI

Product views

These come from the live product path, using the built-in demo data pushed through the API. See docs/CAPTURE.md for the canonical capture protocol.

Dashboard β€” Risk overview

The landing page is the Risk overview: a letter-grade gauge, the four headline counters (actively exploited Β· credentials exposed Β· reachable tools Β· top attack-path risk), the security-posture grade with sub-scores (policy + controls, open evidence, packages + CVEs, reach + exposure, MCP configuration), and the score breakdown for each driver.

agent-bom dashboard overview

Dashboard β€” Attack paths and exposure

The second dashboard frame focuses on the fix-first path list and the coverage / backlog KPIs below it, so the attack-path drilldown stays readable without a tall stitched screenshot.

agent-bom dashboard attack paths and exposure

Fix-first remediation

Risk, reach, fix version, and framework context in one review table β€” operators act without jumping between pages.

agent-bom remediation view

Agent mesh

Agent-centered shared-infrastructure graph β€” selected agents, their shared MCP servers, tools, packages, and findings.

agent-bom agent mesh

How a scan moves through the system β€” five stages, no source code or credentials leave your machine

agent-bom scan pipeline β€” discover, scan, analyze, report, enforce

Inside the engine: parsers, taint, call graph, blast-radius scoring.

agent-bom engine internals

External calls are limited to package metadata, version lookups, and CVE enrichment.


Enterprise self-hosted deployment

agent-bom runs end-to-end inside your infrastructure β€” your AWS account, your VPC, your EKS cluster, your Postgres / ClickHouse / Snowflake, your SSO, your KMS. No hosted control plane. No mandatory vendor backend. No telemetry.

This section is deployment-first: what runs in your infrastructure, what the data path looks like, which stores hold state, and how a focused pilot narrows that same architecture without inventing a different product. The detailed rollout runbooks live under site-docs/deployment/.

Default self-hosted deployment shape

Keep the deployment story split into two views:

  • deployment topology: what runs in the customer's environment
  • runtime MCP flow: how proxy, gateway, API, and upstream MCP calls interact

Everything agent-bom ships runs inside one trust boundary: the customer's VPC, EKS account, or self-managed cluster. The normal cross-boundary paths are inbound OIDC and outbound, policy-audited MCP upstream calls. Enrichment to OSV/NVD is optional and allow-listable.

Layer Lives in Scales via Talks to
Ingress + auth ALB / Istio Gateway + OIDC β€” Corporate IdP (Okta / Entra / Google)
Runtime MCP plane gateway + selected proxy sidecars / local wrappers HPA + PDB Remote MCPs, /v1/proxy/audit
Control plane api, ui, jobs, backup (Helm) HPA + CronJob Data plane, OTEL, Prometheus
Data plane Customer-owned Postgres (+ optional ClickHouse, S3) Operator-managed β€”
Platform glue ExternalSecrets, ServiceMonitor, OTEL collector Operator-managed AWS Secrets Manager / Vault / Grafana
flowchart TB
    classDef ext  fill:#0b1220,stroke:#475569,color:#cbd5e1,stroke-dasharray:3 3
    classDef edge fill:#111827,stroke:#38bdf8,color:#e0f2fe
    classDef ctrl fill:#0f172a,stroke:#6366f1,color:#e0e7ff
    classDef run  fill:#0f172a,stroke:#10b981,color:#d1fae5
    classDef data fill:#0f172a,stroke:#f59e0b,color:#fef3c7
    classDef ops  fill:#0f172a,stroke:#64748b,color:#cbd5e1

    Browser["Browser operators"]:::ext
    IdP["Corporate IdP"]:::ext
    CI["CI + scheduled scans"]:::ext
    Remote["Remote MCPs"]:::ext
    Intel["OSV / NVD / GHSA<br/>optional enrichment"]:::ext

    subgraph Customer["Customer VPC / EKS / self-managed cluster"]
      direction TB
      Ingress["Ingress + TLS"]:::edge

      subgraph Control["Control plane"]
        direction LR
        UI["UI<br/>same-origin browser app"]:::ctrl
        API["API<br/>auth Β· findings Β· fleet Β· audit"]:::ctrl
        Jobs["Workers<br/>CronJob / Job"]:::ctrl
        Backup["Backup job"]:::ctrl
      end

      subgraph Runtime["Runtime MCP plane"]
        direction LR
        Proxy["Proxy<br/>sidecar or laptop wrapper"]:::run
        Gateway["Gateway<br/>agent-bom gateway serve"]:::run
      end

      subgraph Data["Customer-owned data"]
        direction LR
        PG[("Postgres / Supabase")]:::data
        CH[("ClickHouse optional")]:::data
        S3[("S3 optional")]:::data
      end

      subgraph Platform["Platform services"]
        direction LR
        Secrets["ExternalSecrets / IRSA / Vault"]:::ops
        Obs["OTEL + Prometheus"]:::ops
      end
    end

    Browser --> Ingress
    IdP -. OIDC .-> Ingress
    Ingress --> UI
    UI -->|same-origin API calls| API
    CI --> Jobs
    Jobs -->|results + inventory| API
    Proxy -->|audited relay| Gateway
    Gateway -->|POST /v1/proxy/audit| API
    Gateway -->|policy-audited upstream| Remote
    API --> PG
    API -. optional analytics .-> CH
    Backup --> S3
    Secrets --> API
    Secrets --> Gateway
    API --> Obs
    Gateway --> Obs
    API -. optional egress .-> Intel
Loading

Deployment truth: the UI is not the collector. The browser drives workflows, the API owns control-plane state, workers do scans, and proxy plus gateway handle runtime MCP traffic. For the role split, see the Self-Hosted Product Architecture.

MCP proxy and gateway runtime flow

sequenceDiagram
    participant Client as Developer or workload client
    participant Proxy as agent-bom proxy
    participant Gateway as agent-bom gateway
    participant API as Control-plane API
    participant Remote as Remote MCP
    participant Store as Postgres / audit store

    Client->>Proxy: MCP JSON-RPC (stdio / SSE / HTTP)
    Proxy->>Proxy: local policy + runtime checks
    Proxy->>Gateway: audited relay
    Gateway->>API: policy fetch / POST /v1/proxy/audit
    Gateway->>Remote: upstream MCP call
    Remote-->>Gateway: MCP response
    Gateway-->>Proxy: response + shared policy result
    Proxy->>Proxy: optional VLD / OCR redaction
    Proxy-->>Client: safe response
    API->>Store: persist audit, findings, graph links
Loading
  1. The client talks to a local or sidecar agent-bom proxy.
  2. The proxy applies local runtime checks and relays to the central agent-bom gateway.
  3. The gateway evaluates shared policy, records audit to /v1/proxy/audit, then calls the remote MCP upstream.
  4. The response returns on the same path; image responses can run through the visual leak detector before the client sees them.
  5. The API persists audit, findings, and graph links for the UI, exports, and compliance surfaces.

Who owns what

Owner Owns Touches agent-bom via
Security / platform team Policy, fleet, remediation, gateway upstreams Dashboard, API, Helm values
Developers + service owners Local scans, CI gates, proxy config on their workload CLI, GitHub Action, proxy sidecar
Platform / SRE Cluster, ingress, secrets, observability Helm chart, ExternalSecrets, ServiceMonitor
flowchart LR
    sec["Security / platform team"] --> ui["Dashboard + API<br/>policy Β· fleet Β· remediation"]
    dev["Developers + service owners"] --> cli["CLI + CI gate + proxy sidecar"]
    sre["Platform / SRE"] --> helm["Helm chart + secrets + observability"]
    cli --> ui
    helm --> ui
Loading

This is the architecture. A pilot is just a narrower rollout profile over the same surfaces and stores.

Rollout profiles

Profile Turn on first Keep optional until needed
Local + CI/CD gate CLI scans + GitHub Action + HTML/SARIF output fleet, proxy, gateway, ClickHouse
Focused pilot scan + fleet + proxy + API/UI ClickHouse, Snowflake, full gateway rollout
Standard self-hosted scan + fleet + proxy + gateway + API/UI ClickHouse
Regulated / zero-trust standard self-hosted + Istio/Kyverno/ExternalSecret Snowflake

The gateway closes the biggest deployment gap for remote MCP usage: one central URL in your EKS fronts N remote MCP upstreams, so laptops do not each need their own proxy config. See the multi-MCP gateway design and the focused EKS rollout.

Core surfaces and entry points, one shared graph

Surface CLI / route What it does Runs as
scan agent-bom agents, agent-bom image, agent-bom iac Discovery, inventory, CVE enrichment, blast-radius scoring CLI + CronJob
CI/CD gate GitHub Action uses: msaad00/agent-bom@v0.81.0 Pull-request and release gating, SARIF, policy-driven exits GitHub Actions runner
fleet POST /v1/fleet/sync + CLI --push-url Endpoint + collector fleet ingest with tenant scoping API endpoint
proxy / runtime agent-bom proxy (stdio) / --sse (HTTP) Inline MCP JSON-RPC inspection + policy enforcement K8s sidecar or laptop wrapper
gateway agent-bom gateway serve, /v1/gateway/policies, /v1/proxy/audit Central HTTP traffic plane plus shared policy/audit plane Service + API routes
API + UI /v1/* + Next.js dashboard Findings, graph, remediation, compliance, posture 2 Deployments + HPA
OTEL / observability POST /v1/traces, --otel-endpoint, API tracing W3C trace context, OTLP export, and OTEL trace ingest for runtime evidence API route + CLI/runtime hooks

By default, findings, fleet data, audit logs, graph state, and remediation outputs stay in your infrastructure. Optional egress (OSV lookups, NVD enrichment, Slack / Jira / Vanta / Drata webhooks, SIEM / OTLP) is operator-controlled.

OTEL is first-class, OPA is optional interop

agent-bom already treats OpenTelemetry as a real product surface, not a bolt-on:

  • the API preserves W3C traceparent context and can export request spans over OTLP/HTTP
  • the CLI can emit OTLP metrics and scan context to your collector with --otel-endpoint
  • the control plane can ingest OTEL traces at POST /v1/traces
  • runtime protection can consume OTEL traces as evidence, not just emit them

Policy is different. The shipped gateway and proxy use the repo's native JSON policy engine, not OPA/Rego. That is an intentional product choice documented in ADR-002: lower operator complexity, no extra OPA binary, and one policy model shared across scan, gateway, proxy, and runtime.

What makes sense today:

  • promote OTEL as a first-class interoperability path
  • keep the native policy engine as the default shipped control plane
  • treat OPA/Rego as a future enterprise interop option, such as bundle import/export or an external decision hook, not as a replacement for the current engine

Two enforcement shapes, one control plane

Pilot teams pick per workload:

  • agent-bom gateway serve β€” central multi-upstream HTTP gateway. One service in your EKS fronts N MCP upstreams (SaaS MCPs, Snowflake-hosted MCPs, in-cluster MCPs) and every laptop points at /mcp/{server-name} over HTTP/SSE. Fleet-driven auto-discovery via --from-control-plane so the upstream list comes from the scans your team already runs, not a blank YAML. Source: src/agent_bom/gateway_server.py, CLI: src/agent_bom/cli/_gateway.py, tests: tests/test_gateway_server.py.
  • agent-bom proxy β€” per-MCP sidecar or stdio wrapper (proxy.py:527 stdio, proxy.py:258 HTTP/SSE). One instance per server. The honest mode for stdio-only MCPs and for workload-local enforcement where a shared traffic plane would hairpin.

Both modes pull the same gateway policy (/v1/gateway/policies) and push to the same audit sink (/v1/proxy/audit). Central control, edge enforcement, no hairpinning.

Backend matrix β€” pick what fits your data

agent-bom does not treat every backend as interchangeable. Pick per capability β€” full detail in backend-parity.md.

Capability SQLite Postgres / Supabase (default) ClickHouse (analytics) Snowflake (warehouse-native)
Scan jobs + fleet agents + gateway policies + audit log βœ“ βœ“ n/a (not a transactional store) βœ“
Exceptions, schedules, graph βœ“ (SQLite stores ship in repo) βœ“ n/a n/a (not yet ported)
API keys + trend store Postgres-only βœ“ n/a n/a (not yet ported)
Row-level tenant isolation βœ“ βœ“ βœ“ βœ“ (governance-oriented)
High-volume OLAP / time-series n/a n/a βœ“ βœ“ (via Snowpark)
Best for laptops, single-node standard EKS pilot audit + analytics at scale you already live in Snowflake

Source: src/agent_bom/api/store.py, postgres_store.py, clickhouse_store.py, snowflake_store.py. Parity roadmap: backend-parity.md.

Common deployment shapes:

  • Pilot default β€” Postgres (or Supabase) control plane. Everything works, fastest install.
  • Analytics-heavy β€” Postgres + ClickHouse. Postgres stays transactional; ClickHouse ingests the audit/event firehose.
  • Snowflake-native (unified stack) β€” Snowflake as the primary and analytics store. Uses Hybrid Tables for transactional writes (scan / fleet / policy / audit), columnar tables for analytics, Snowpipe Streaming for real-time ingest, and the Postgres-compatible protocol where clients need it. Cross-cloud replication lets EKS read/write the same tables your Cortex MCPs read, regardless of region. Best when you already govern data there. See snowflake-backend.md.

Ready-made Helm values files

Three shipped examples in deploy/helm/agent-bom/examples/:

File Shape Use when
eks-mcp-pilot-values.yaml Postgres + MCP-focused scanner CronJob + restricted ingress Pilot scope, MCP + agents + fleet + proxy
eks-production-values.yaml Postgres pool tuned + HPA + pod anti-affinity + PriorityClass Production rollout
eks-istio-kyverno-values.yaml Istio mTLS + Kyverno policy + PSA restricted Regulated / zero-trust environments
eks-snowflake-values.yaml Snowflake as primary backend via key-pair auth You already govern data in Snowflake

The scoped product stack

Most self-hosted teams start with the surfaces below. The focused pilot simply turns on a narrower subset first; it does not use a different architecture. Every one of them maps to code in this repo and ships today.

  • scan β€” discovery, inventory, CVE, image, IaC, Kubernetes, cloud analysis (src/agent_bom/cli/agents/)
  • CI/CD gate β€” GitHub Action packaging of the scan surface for pull-request and release workflows with SARIF output
  • fleet β€” endpoint + collector inventory pushed into the control plane (POST /v1/fleet/sync)
  • proxy / runtime β€” per-MCP sidecar or stdio wrapper β€” the honest mode for stdio MCPs and workload-local enforcement (src/agent_bom/proxy.py)
  • gateway β€” two things, same namespace:
  • API + UI β€” operator plane for findings, graph, remediation, audit, policy, compliance (src/agent_bom/api/server.py, ui/)

1. External flow β€” where the data comes from

flowchart LR
    clients["Cursor Β· Claude Β· VS Code<br/>Codex Β· Cortex Β· Continue"]
    cli["agent-bom agents --push"]
    prx["agent-bom proxy &lt;mcp&gt;"]
    cp(["agent-bom control plane<br/>in your EKS cluster"])

    clients -.-> cli
    clients -.-> prx
    cli -->|HTTPS push| cp
    prx -->|policy pull Β· audit push| cp
Loading

2. Inside your EKS cluster β€” what actually deploys

The Helm chart installs a single namespace with the control plane, its backup job, and the operator surface. Selected MCP workloads run alongside with an agent-bom-proxy sidecar that pulls gateway policy and pushes audit events back.

flowchart TB
    subgraph ns["namespace: agent-bom"]
        direction TB
        api["Deployment: agent-bom-api<br/>3 replicas Β· HPA Β· /readyz drain"]
        ui["Deployment: agent-bom-ui<br/>2 replicas"]
        cron["CronJob: controlplane-backup<br/>pg_dump β†’ S3 (SSE-KMS)"]
        es[("ExternalSecret<br/>API keys Β· HMAC key Β· DB URL")]
        obs["PrometheusRule + Grafana dashboard ConfigMap"]
    end

    subgraph work["Selected MCP workloads (same or adjacent ns)"]
        direction LR
        mcpsvc["MCP server pod"]
        proxy["Sidecar: agent-bom-proxy"]
        mcpsvc -.- proxy
    end

    api --- ui
    api --- es
    api -. scrape / alert .- obs
    api --- cron
    proxy -->|policy pull Β· audit push| api
Loading

Outside the namespace but in your VPC: Postgres (primary state), ClickHouse (optional analytics), External Secrets wired to KMS, and Prometheus + Grafana + OTel scraping the API. The restore round-trip is exercised in CI (backup-restore.yml).

3. How a request flows through the control plane

flowchart TB
    REQ([HTTP request])
    BODY[Body size + read timeout]
    TRACE[Trust headers + W3C trace]
    AUTH["Auth β€” API key Β· OIDC Β· SAML"]
    RBAC[RBAC role check]
    TENANT[Tenant context propagation]
    QUOTA[Tenant quota + rate limit]
    ROUTE[Route handler]
    AUDIT[(HMAC audit log)]
    STORE[(Postgres Β· ClickHouse Β· Snowflake<br/>KMS at rest)]

    REQ --> BODY --> TRACE --> AUTH --> RBAC --> TENANT --> QUOTA --> ROUTE
    ROUTE --> AUDIT
    ROUTE --> STORE
Loading

Every layer is testable on its own; failures emit Prometheus metrics. Operators introspect a live request via GET /v1/auth/debug and see rotation status via GET /v1/auth/policy.

4. Day-1 install on EKS (scripted)

Inside the control plane: OIDC + SAML SSO with RBAC, enforced API-key rotation policy, tenant-scoped quotas + rate limits, HMAC-chained audit log with signed export, KMS-encrypted Postgres backups with a verified restore round-trip in CI (backup-restore.yml), and signed compliance evidence bundles with Ed25519 asymmetric signing (/v1/compliance/{framework}/report β€” key pinned via /v1/compliance/verification-key, verification cookbook at docs/COMPLIANCE_SIGNING.md).

Pilot teams run:

# 1. Pick your backend shape (postgres default; snowflake / istio / production also shipped)
helm install agent-bom oci://ghcr.io/msaad00/charts/agent-bom \
  --version 0.81.0 \
  -n agent-bom --create-namespace \
  -f deploy/helm/agent-bom/examples/eks-mcp-pilot-values.yaml

# 2. Smoke-test the install end-to-end β€” health + auth + fleet + scan + evidence bundle
kubectl -n agent-bom port-forward svc/agent-bom-api 8080:8080 &
./scripts/pilot-verify.sh http://localhost:8080 "$API_KEY"

# 3. Sync endpoint fleet
agent-bom agents --preset enterprise --introspect \
  --push-url https://agent-bom.example.com/v1/fleet/sync

# 4. Wrap one MCP server with the runtime proxy (per-MCP today β€” see roadmap note above)
agent-bom proxy --policy ./policy.json -- <editor-mcp-command>

# 5. Pull an auditor-ready evidence bundle
curl -sD headers.txt -o soc2.json \
  "https://agent-bom.example.com/v1/compliance/soc2/report" \
  -H "Authorization: Bearer $API_KEY"

See docs/ENTERPRISE_SECURITY_PLAYBOOK.md for the full enterprise trust story β€” every capability mapped to a code path and a test, with the scripted EKS pilot install at the end. Also: site-docs/deployment/eks-mcp-pilot.md for the focused pilot runbook and docs/COMPLIANCE_SIGNING.md for offline signature verification.

Operator guides by scenario:

Scenario Guide
Enterprise trust story (start here for pilots) ENTERPRISE_SECURITY_PLAYBOOK.md
Own AWS / EKS end-to-end own-infra-eks.md
Enterprise pilot scope enterprise-pilot.md
Focused EKS MCP pilot eks-mcp-pilot.md
Endpoint fleet on laptops endpoint-fleet.md
Snowflake-native backend snowflake-backend.md
Istio + Kyverno zero-trust kubernetes.md
Backend parity matrix backend-parity.md
Grafana dashboards grafana.md
SIEM / OCSF integration siem-integration.md
Metrics catalog + SLOs OBSERVABILITY_METRICS.md
Performance + sizing performance-and-sizing.md

Self-hosted SSO uses OIDC or SAML; SAML admins fetch SP metadata at /v1/auth/saml/metadata. Control-plane API keys follow an enforced lifetime policy (AGENT_BOM_API_KEY_DEFAULT_TTL_SECONDS, AGENT_BOM_API_KEY_MAX_TTL_SECONDS); rotate in place at /v1/auth/keys/{key_id}/rotate.


Trust & transparency

agent-bom is a read-only scanner. It never writes configs, never executes MCP servers, never stores credential values. No telemetry. No analytics. Releases are Sigstore-signed with SLSA provenance and self-published SBOMs.

When What's sent Where Opt out
Default CVE lookups Package names + versions OSV API --offline
Floating version resolution Names + requested version npm / PyPI / Go proxy --offline
--enrich CVE IDs NVD, EPSS, CISA KEV omit --enrich
--deps-dev Package names + versions deps.dev omit --deps-dev
verify Package + version PyPI / npm integrity endpoints don't run verify
Optional integrations Finding summaries Slack / Jira / Vanta / Drata don't pass those flags

Full trust model: SECURITY_ARCHITECTURE.md Β· PERMISSIONS.md Β· SUPPLY_CHAIN.md Β· RELEASE_VERIFICATION.md.

Compliance

Bundled mappings for FedRAMP, CMMC, NIST AI RMF, ISO 27001, SOC 2, OWASP LLM Top-10, MITRE ATLAS, and EU AI Act. Export tamper-evident evidence packets in one command.

agent-bom compliance mapping β€” finding to control to evidence packet

agent-bom agents -p . --compliance-export fedramp -o fedramp-evidence.zip
agent-bom agents -p . --compliance-export nist-ai-rmf -o evidence.zip

The audit log itself is HMAC-chained and exportable as a signed JSON/JSONL bundle at GET /v1/audit/export.

Install & deploy

pip install agent-bom                        # CLI
docker run --rm agentbom/agent-bom agents    # Docker

For published containers, the split is:

  • agentbom/agent-bom = the main runtime image for CLI, API, jobs, gateway, proxy-related entrypoints, and MCP server mode
  • agentbom/agent-bom-ui = the standalone browser UI image used when the self-hosted control plane runs the UI separately from the API
Mode Best for
CLI (agent-bom agents) local audit + project scan
Endpoint fleet (--push-url …/v1/fleet/sync) employee laptops pushing into self-hosted fleet
GitHub Action (uses: msaad00/agent-bom@v0.81.0) CI/CD + SARIF
Docker (agentbom/agent-bom) isolated scans, API jobs, and non-browser self-hosted entrypoints
Browser UI image (agentbom/agent-bom-ui) the separate Next.js UI container paired with a self-hosted API
Kubernetes / Helm (helm install agent-bom deploy/helm/agent-bom) self-hosted API + dashboard, scheduled discovery
REST API (agent-bom api) platform integration, self-hosted control plane
MCP server (agent-bom mcp server) Claude Desktop, Claude Code, Cursor, Codex, Windsurf, Cortex
Runtime proxy (agent-bom proxy) MCP traffic enforcement
Shield SDK (from agent_bom.shield import Shield) in-process protection

Backend choices stay explicit and optional:

  • SQLite for local and single-node use
  • Postgres / Supabase for the primary transactional control plane
  • ClickHouse for analytics and event-scale persistence
  • Snowflake for warehouse-native governance and selected backend paths

Run locally, in CI, in Docker, in Kubernetes, as a self-hosted API + dashboard, or as an MCP server β€” no mandatory hosted control plane, no mandatory cloud vendor.

References: PRODUCT_BRIEF.md Β· PRODUCT_METRICS.md Β· ENTERPRISE.md Β· How agent-bom works.

CI/CD in 60 seconds
- uses: msaad00/agent-bom@v0.81.0
  with:
    scan-type: scan
    severity-threshold: high
    upload-sarif: true
    enrich: true
    fail-on-kev: true

Container image gate, IaC gate, air-gapped CI, MCP scan, and the SARIF / SBOM examples are documented in site-docs/getting-started/quickstart.md.

MCP server

36 security tools available inside any MCP-compatible AI assistant:

{
  "mcpServers": {
    "agent-bom": {
      "command": "uvx",
      "args": ["agent-bom", "mcp", "server"]
    }
  }
}

Also on Glama, Smithery, MCP Registry, and OpenClaw.

Install extras + output formats
Extra Command
Cloud providers pip install 'agent-bom[cloud]'
MCP server pip install 'agent-bom[mcp-server]'
REST API pip install 'agent-bom[api]'
Dashboard pip install 'agent-bom[ui]'
SAML SSO pip install 'agent-bom[saml]'

JSON Β· SARIF Β· CycloneDX 1.6 (with ML BOM) Β· SPDX 3.0 Β· HTML Β· Graph JSON Β· Graph HTML Β· GraphML Β· Neo4j Cypher Β· JUnit XML Β· CSV Β· Markdown Β· Mermaid Β· SVG Β· Prometheus Β· Badge Β· Attack Flow Β· plain text. OCSF is used for runtime / SIEM event delivery, not as a general report format.

Contributing

git clone https://github.com/msaad00/agent-bom.git && cd agent-bom
pip install -e ".[dev-all]"
pytest && ruff check src/

CONTRIBUTING.md Β· docs/CLI_DEBUG_GUIDE.md Β· SECURITY.md Β· CODE_OF_CONDUCT.md


Apache 2.0 β€” LICENSE

Release History

VersionChangesUrgencyDate
v0.81.0## What's Changed * [codex] add hosted product spec and split deployment diagrams by @msaad00 in https://github.com/msaad00/agent-bom/pull/1601 * Add source registry and wire the Sources page by @msaad00 in https://github.com/msaad00/agent-bom/pull/1602 * Fix release coherence and tenant isolation by @msaad00 in https://github.com/msaad00/agent-bom/pull/1603 * [docs] simplify self-hosted deployment and runtime flow diagrams by @msaad00 in https://github.com/msaad00/agent-bom/pull/1604 * [platforHigh4/21/2026
v0.80.1## What's Changed * [codex] simplify EKS topology and MCP flow diagrams by @msaad00 in https://github.com/msaad00/agent-bom/pull/1597 * [codex] fix UI image release path by @msaad00 in https://github.com/msaad00/agent-bom/pull/1598 * [codex] clarify hosted intake architecture by @msaad00 in https://github.com/msaad00/agent-bom/pull/1599 * [codex] bump release version to 0.80.1 by @msaad00 in https://github.com/msaad00/agent-bom/pull/1600 **Full Changelog**: https://github.com/msaad00/agent-bomHigh4/21/2026
v0.80.0## What's Changed * [codex] fix release workflow reusable docs permissions by @msaad00 in https://github.com/msaad00/agent-bom/pull/1593 * [codex] bump release version to 0.80.0 by @msaad00 in https://github.com/msaad00/agent-bom/pull/1594 * [codex] clarify README EKS architecture diagram by @msaad00 in https://github.com/msaad00/agent-bom/pull/1595 * docs: enterprise deployment topology with trust boundary + MCP flow by @msaad00 in https://github.com/msaad00/agent-bom/pull/1596 **Full ChangelHigh4/21/2026
v0.78.1## What's Changed * docs: fix restore script link for strict build by @msaad00 in https://github.com/msaad00/agent-bom/pull/1534 * release: align v0.78.1 surfaces by @msaad00 in https://github.com/msaad00/agent-bom/pull/1535 **Full Changelog**: https://github.com/msaad00/agent-bom/compare/v0...v0.78.1High4/19/2026
v0.78.0## What's Changed * Prepare 0.77.0 release by @msaad00 in https://github.com/msaad00/agent-bom/pull/1497 * Correct release to 0.77.1 by @msaad00 in https://github.com/msaad00/agent-bom/pull/1498 * Phase 0+1 hardening: rotation, drain, webhook retry, README + visuals by @msaad00 in https://github.com/msaad00/agent-bom/pull/1499 * Add backup-restore round-trip CI workflow by @msaad00 in https://github.com/msaad00/agent-bom/pull/1500 * Add tenant_id column to ClickHouse analytics for row-level isolHigh4/19/2026
v0.76.4## What's Changed * Tighten README and dashboard onboarding by @msaad00 in https://github.com/msaad00/agent-bom/pull/1333 * Tighten operator UI and trace review by @msaad00 in https://github.com/msaad00/agent-bom/pull/1334 * Focus operator graph views by @msaad00 in https://github.com/msaad00/agent-bom/pull/1335 * Tighten README visuals and simplify primary navigation by @msaad00 in https://github.com/msaad00/agent-bom/pull/1336 * chore(deps-dev): bump @types/node from 25.5.2 to 25.6.0 in /sdks/Medium4/13/2026
v0.76.2## What's Changed * fix: ingest Alpine secdb and prepare 0.76.2 by @msaad00 in https://github.com/msaad00/agent-bom/pull/1332 **Full Changelog**: https://github.com/msaad00/agent-bom/compare/v0...v0.76.2Medium4/10/2026
v0.76.1## What's Changed * [codex] align CLI output contracts by @msaad00 in https://github.com/msaad00/agent-bom/pull/1321 * [codex] align graph and contributor extras by @msaad00 in https://github.com/msaad00/agent-bom/pull/1322 * chore(deps): bump react from 19.2.4 to 19.2.5 in /ui by @dependabot[bot] in https://github.com/msaad00/agent-bom/pull/1326 * chore(deps): bump react-dom from 19.2.4 to 19.2.5 in /ui by @dependabot[bot] in https://github.com/msaad00/agent-bom/pull/1324 * [codex] align live MMedium4/9/2026
v0.76.0## What's Changed * feat(api): polish distributed tracing headers by @msaad00 in https://github.com/msaad00/agent-bom/pull/1246 * feat(ci): guard JS supply chain surfaces by @msaad00 in https://github.com/msaad00/agent-bom/pull/1248 * chore(deps-dev): bump @types/node from 25.5.0 to 25.5.2 in /sdks/typescript by @dependabot[bot] in https://github.com/msaad00/agent-bom/pull/1249 * chore(deps-dev): bump typescript from 5.9.3 to 6.0.2 in /sdks/typescript by @dependabot[bot] in https://github.com/msMedium4/9/2026
v0.75.15## What's Changed * feat(ci): add daily preventive security automation by @msaad00 in https://github.com/msaad00/agent-bom/pull/1213 * chore(deps): bump next from 16.2.1 to 16.2.2 in /ui by @dependabot[bot] in https://github.com/msaad00/agent-bom/pull/1218 * chore(deps-dev): bump @types/node from 25.5.0 to 25.5.2 in /ui by @dependabot[bot] in https://github.com/msaad00/agent-bom/pull/1221 * fix(api): enforce tenant isolation on fleet and schedules by @msaad00 in https://github.com/msaad00/agent-Medium4/5/2026
v0.75.14## What's Changed * fix(mcp): shorten registry description for schema validation by @msaad00 in https://github.com/msaad00/agent-bom/pull/1181 * docs(mcp): expand first-class client integration guides by @msaad00 in https://github.com/msaad00/agent-bom/pull/1182 * chore: tighten audit-driven docs and config hygiene by @msaad00 in https://github.com/msaad00/agent-bom/pull/1183 * feat(skills): deepen review verdicts and behavior analysis by @msaad00 in https://github.com/msaad00/agent-bom/pull/118Medium4/4/2026
v0.75.13## What's Changed * fix(release): harden provenance bundle export by @msaad00 in https://github.com/msaad00/agent-bom/pull/1157 * feat(cli): add operator summary and mesh view by @msaad00 in https://github.com/msaad00/agent-bom/pull/1158 * feat(skills): add deterministic bundle identity by @msaad00 in https://github.com/msaad00/agent-bom/pull/1164 * docs: clarify capabilities and deployment guidance by @msaad00 in https://github.com/msaad00/agent-bom/pull/1167 * feat(remediation): add guided fixMedium4/2/2026
v0.75.12## What's Changed * Fix post-release hygiene: uv.lock, demo, dist cleanup by @msaad00 in https://github.com/msaad00/agent-bom/pull/1128 * Fix self-scan, provenance export, and release surface alignment by @msaad00 in https://github.com/msaad00/agent-bom/pull/1129 * feat(cli): add first-class skills scan and verify by @msaad00 in https://github.com/msaad00/agent-bom/pull/1139 * chore(deps): bump dependabot/fetch-metadata from 2.5.0 to 3.0.0 by @dependabot[bot] in https://github.com/msaad00/agent-Medium3/30/2026
v0.75.11## What's Changed * Add CWE impact classification engine and CLI UX improvements by @msaad00 in https://github.com/msaad00/agent-bom/pull/1116 * Wire CWE-aware filtering into blast radius construction by @msaad00 in https://github.com/msaad00/agent-bom/pull/1117 * Fix compliance framework count and README cleanup by @msaad00 in https://github.com/msaad00/agent-bom/pull/1118 * Harden supply chain pinning and add dynamic framework count by @msaad00 in https://github.com/msaad00/agent-bom/pull/1119Medium3/29/2026
v0.75.10## What's Changed * Refresh stale 0.75.9 demo asset by @msaad00 in https://github.com/msaad00/agent-bom/pull/1107 * Stabilize requests and UI dependency advisories by @msaad00 in https://github.com/msaad00/agent-bom/pull/1108 * Tighten final 0.75.10 stability edges by @msaad00 in https://github.com/msaad00/agent-bom/pull/1109 * chore(deps): bump cryptography from 46.0.5 to 46.0.6 by @dependabot[bot] in https://github.com/msaad00/agent-bom/pull/1110 * Harden runtime stdin and Slack delivery reporMedium3/28/2026
v0.75.9## What's Changed * Fix MCP registry publish diagnostics by @msaad00 in https://github.com/msaad00/agent-bom/pull/1097 * Fix MCP Registry PyPI publish marker by @msaad00 in https://github.com/msaad00/agent-bom/pull/1098 * Align 0.75.8 release surfaces and claims by @msaad00 in https://github.com/msaad00/agent-bom/pull/1099 * Harden final OpenSSF release surfaces by @msaad00 in https://github.com/msaad00/agent-bom/pull/1100 * Add non-failing mode for package checks by @msaad00 in https://github.cMedium3/27/2026
v0.75.8## What's Changed * Harden release consistency and storefront automation by @msaad00 in https://github.com/msaad00/agent-bom/pull/1090 * Split PyPI storefront from GitHub README by @msaad00 in https://github.com/msaad00/agent-bom/pull/1091 * Salvage runtime BOM diff improvements by @msaad00 in https://github.com/msaad00/agent-bom/pull/1092 * Harden workflow permissions and review noise by @msaad00 in https://github.com/msaad00/agent-bom/pull/1093 * Tighten workflow perms and pin pip bootstrap byMedium3/26/2026
v0.75.7## What's Changed * Align 0.75.7 release version and guard tags by @msaad00 in https://github.com/msaad00/agent-bom/pull/1089 **Full Changelog**: https://github.com/msaad00/agent-bom/compare/v0...v0.75.7Medium3/26/2026
v0.75.6## What's Changed * Guard Trivy SARIF upload on rescan by @msaad00 in https://github.com/msaad00/agent-bom/pull/1087 * Upgrade runtime zlib for release image by @msaad00 in https://github.com/msaad00/agent-bom/pull/1088 **Full Changelog**: https://github.com/msaad00/agent-bom/compare/v0.75.5...v0.75.6Medium3/26/2026
v0.75.3## What's Changed * fix: Codex audit v3 β€” no-scan network, offline messaging, skills sync by @msaad00 in https://github.com/msaad00/agent-bom/pull/1045 * fix: --no-scan skips all DB messaging + offline clean one-liner by @msaad00 in https://github.com/msaad00/agent-bom/pull/1046 * feat: wire NIST 800-53 + FedRAMP + PCI DSS into compliance API (closes #934, #935, #936) by @msaad00 in https://github.com/msaad00/agent-bom/pull/1047 * fix: final Codex polish β€” no-scan DB noise + count drift by @msaaMedium3/23/2026
v0.75.2## What's Changed * fix: behavioral correctness β€” offline, IaC isolation, version (v0.75.2) by @msaad00 in https://github.com/msaad00/agent-bom/pull/1039 * fix: --posture flag exposed + offline messaging + field access (Codex v4) by @msaad00 in https://github.com/msaad00/agent-bom/pull/1043 **Full Changelog**: https://github.com/msaad00/agent-bom/compare/v0...v0.75.2Medium3/23/2026
v0.75.1## What's Changed * docs: update README demo GIF to v0.75.0 by @msaad00 in https://github.com/msaad00/agent-bom/pull/1036 * release: v0.75.1 β€” Codex audit fixes + security hardening by @msaad00 in https://github.com/msaad00/agent-bom/pull/1037 **Full Changelog**: https://github.com/msaad00/agent-bom/compare/v0...v0.75.1Medium3/23/2026
v0.75.0## What's Changed * docs: Enterprise Deployment guide + demo tape v0.74.1 by @msaad00 in https://github.com/msaad00/agent-bom/pull/1008 * chore(deps): batch dependency update (March 2026) by @msaad00 in https://github.com/msaad00/agent-bom/pull/1017 * fix: P0/P1 hardening β€” multi-tenancy, quarantine, audit chain, confidence by @msaad00 in https://github.com/msaad00/agent-bom/pull/1018 * feat: Phase 3 β€” dashboard UX (posture grade, attack paths, security graph) by @msaad00 in https://github.com/mMedium3/23/2026
v0.74.1## What's Changed * fix: MCP Registry description length (422 validation) by @msaad00 in https://github.com/msaad00/agent-bom/pull/1002 * Use pyproject.toml as source of truth for version in publish workflow by @andres-linero in https://github.com/msaad00/agent-bom/pull/1001 * Enterprise foundation: dev experience, scanner accuracy, bug fixes by @msaad00 in https://github.com/msaad00/agent-bom/pull/1003 * fix: runtime security + compliance wiring audit fixes by @msaad00 in https://github.com/msaLow3/22/2026
v0.74.0## What's Changed * fix: update integration descriptions for v0.72.0 by @msaad00 in https://github.com/msaad00/agent-bom/pull/966 * feat: 5-product CLI architecture + CycloneDX ML BOM + agent-shield deep defense by @msaad00 in https://github.com/msaad00/agent-bom/pull/967 * fix: harden fleet min_trust filter for Python 3.14 compat by @msaad00 in https://github.com/msaad00/agent-bom/pull/969 * fix: mock scan pipeline in API tests + graph-export and shield endpoints by @msaad00 in https://github.cLow3/21/2026
v0.72.0## What's Changed * fix: upgrade Next.js 16.1.7 β†’ 16.2.0 β€” fixes 3 HIGH GHSAs by @msaad00 in https://github.com/msaad00/agent-bom/pull/951 * fix: handle Go pseudo-versions in vulnerability range comparison by @msaad00 in https://github.com/msaad00/agent-bom/pull/952 * fix: suppress Scorecard-flagged GHSAs β€” all fixed at locked versions by @msaad00 in https://github.com/msaad00/agent-bom/pull/954 * feat: expand Terraform IaC rules 20β†’50 (TF-SEC-021 through TF-SEC-050) by @msaad00 in https://githuLow3/19/2026
v0.71.4## What's Changed * fix: self-scan gate blocks all publish jobs in release pipeline (#943) by @msaad00 in https://github.com/msaad00/agent-bom/pull/944 * fix: SARIF relative paths + filter self-scan to HIGH+ only by @msaad00 in https://github.com/msaad00/agent-bom/pull/945 * fix: skip git SHA fixed_versions β€” eliminates false positive CVE matches by @msaad00 in https://github.com/msaad00/agent-bom/pull/946 * fix: upgrade pip in Docker images β€” fixes CVE-2025-8869 + CVE-2026-1703 by @msaad00 in hLow3/18/2026
v0.71.3## What's Changed * chore(deps): bump next from 16.1.6 to 16.1.7 in /ui by @dependabot[bot] in https://github.com/msaad00/agent-bom/pull/916 * fix: release hardening β€” Docker Hub sync, demo clean, HELM-003 Jinja, transitive log, docs flag by @msaad00 in https://github.com/msaad00/agent-bom/pull/919 * fix: release hardening β€” Docker Hub auto-sync, demo clean paths, HELM-003 Jinja, transitive log, prod docs flag by @msaad00 in https://github.com/msaad00/agent-bom/pull/918 * ci: mark Python 3.14 asLow3/18/2026
v0.71.2## What's Changed * fix: prevent false positive CVEs when installed version >= patched version by @msaad00 in https://github.com/msaad00/agent-bom/pull/895 * fix: proxy hardening β€” credential detection in errors, rate limit enforcement, audit log rotation by @msaad00 in https://github.com/msaad00/agent-bom/pull/896 * fix: parser symlink cycle dedup + transitive dep logging + doc alignment by @msaad00 in https://github.com/msaad00/agent-bom/pull/897 * fix: scanner accuracy β€” GHSA multi-range OR lLow3/17/2026
v0.71.1## What's Changed * chore: remove ToolHive integration by @msaad00 in https://github.com/msaad00/agent-bom/pull/882 * chore: weekly uv.lock upgrade 2026-03-16 by @msaad00 in https://github.com/msaad00/agent-bom/pull/883 * fix: ensure packaging installed in GitHub Action by @msaad00 in https://github.com/msaad00/agent-bom/pull/888 * chore: MCP registry sync β€” 0 new, 15 versions, 0 CVE-enriched by @msaad00 in https://github.com/msaad00/agent-bom/pull/884 * fix: skip CWD auto-detect when --sbom is Low3/16/2026
v0.71.0## What's Changed * fix: repo alignment audit β€” GIF, proxy syntax, cloud descriptions by @msaad00 in https://github.com/msaad00/agent-bom/pull/856 * feat: agent-bom mcp command group by @msaad00 in https://github.com/msaad00/agent-bom/pull/857 * feat: focused scan commands β€” image, fs, iac, sbom by @msaad00 in https://github.com/msaad00/agent-bom/pull/858 * feat: agent-bom cloud command group by @msaad00 in https://github.com/msaad00/agent-bom/pull/859 * docs: align README + CLI help with new coLow3/16/2026
v0.70.12## What's Changed * perf: 3x scan speed β€” fix DB query bottleneck by @msaad00 in https://github.com/msaad00/agent-bom/pull/835 * chore(deps): bump sigstore/cosign-installer from 4.0.0 to 4.1.0 by @dependabot[bot] in https://github.com/msaad00/agent-bom/pull/837 * chore(deps): bump actions/download-artifact from 8.0.0 to 8.0.1 by @dependabot[bot] in https://github.com/msaad00/agent-bom/pull/838 * chore(deps): bump astral-sh/setup-uv from 7.3.1 to 7.5.0 by @dependabot[bot] in https://github.com/msLow3/15/2026
v0.70.11## What's Changed * fix: rename demo GIF to v0.70.10 by @msaad00 in https://github.com/msaad00/agent-bom/pull/832 * fix: remove packaging dependency from upgrade command by @msaad00 in https://github.com/msaad00/agent-bom/pull/833 * chore: bump version to v0.70.11 by @msaad00 in https://github.com/msaad00/agent-bom/pull/834 **Full Changelog**: https://github.com/msaad00/agent-bom/compare/v0...v0.70.11Low3/15/2026
v0.70.10## What's Changed * feat: agent-bom upgrade command + clean demo GIF by @msaad00 in https://github.com/msaad00/agent-bom/pull/830 * chore: bump version to v0.70.10 by @msaad00 in https://github.com/msaad00/agent-bom/pull/831 **Full Changelog**: https://github.com/msaad00/agent-bom/compare/v0...v0.70.10Low3/15/2026
v0.70.9## What's Changed * docs: v0.70.8 demo GIF β€” 1400x800 high resolution by @msaad00 in https://github.com/msaad00/agent-bom/pull/782 * fix: compliance SVG 10β†’13 frameworks + Ruby in README by @msaad00 in https://github.com/msaad00/agent-bom/pull/788 * fix: OpenSSF Scorecard β€” upgrade flatted, suppress false positives, tighten permissions by @msaad00 in https://github.com/msaad00/agent-bom/pull/789 * feat: update tagline β€” "Security scanner for AI infrastructure" by @msaad00 in https://github.com/mLow3/15/2026
v0.70.8## What's Changed * feat: SDK shared patterns.json + cross-language test fixtures by @msaad00 in https://github.com/msaad00/agent-bom/pull/753 * fix: MCP Registry description <= 100 chars by @msaad00 in https://github.com/msaad00/agent-bom/pull/754 * fix: move railway.json to project root β€” fix SSE deploy by @msaad00 in https://github.com/msaad00/agent-bom/pull/755 * feat: TypeScript runtime SDK β€” 7 MCP traffic detectors by @msaad00 in https://github.com/msaad00/agent-bom/pull/756 * chore(deps):Low3/14/2026
v0.70.7## What's Changed * fix: self-scan workflows use wrong CLI flags by @msaad00 in https://github.com/msaad00/agent-bom/pull/695 * chore: reorganize repo root — 19 dirs → 11, 38 files → 20 by @msaad00 in https://github.com/msaad00/agent-bom/pull/697 * fix: SEVERITY_ORDER missing UNKNOWN + CVSS 0.0 → none by @msaad00 in https://github.com/msaad00/agent-bom/pull/715 * fix: SARIF security-severity property + UNKNOWN→note by @msaad00 in https://github.com/msaad00/agent-bom/pull/716 * feat: GitHub ActioLow3/13/2026
v0.70.6## Scanner Accuracy & Robustness - **Severity defaults fixed**: All 5 scanner sources (OSV, GHSA, Snyk, local DB, SARIF) now default unknown severity to `UNKNOWN` instead of silently inflating to `MEDIUM` - **EPSS null handling**: Missing EPSS data stored as `None` (not `0.0` β€” which falsely implied "0% exploit risk") - **CVSS 0.0 preserved**: Legitimate CVSS 0.0 (NONE severity) no longer silently converted to `None` - **Snyk severity**: No more silent inflation from `attrs.get("severity", "medLow3/12/2026
v0.70.5## What's Changed * test: push coverage to 80% β€” CLI and MCP tool impl tests by @msaad00 in https://github.com/msaad00/agent-bom/pull/636 * fix: stale local DB warning + OTel hardening (schema validation, 50MB cap, framework expansion) by @msaad00 in https://github.com/msaad00/agent-bom/pull/642 * feat: post-merge self-scan + release gate on critical CVE by @msaad00 in https://github.com/msaad00/agent-bom/pull/648 * chore(deps): bump tornado from 6.5.4 to 6.5.5 by @dependabot[bot] in https://gitLow3/12/2026
v0.70.4## What's Changed * fix: harden local vuln DB security β€” chmod 0600, HTTPS-only sync, path validation, integrity check + Alpine CI by @msaad00 in https://github.com/msaad00/agent-bom/pull/634 * chore: bump version to 0.70.4 by @msaad00 in https://github.com/msaad00/agent-bom/pull/635 **Full Changelog**: https://github.com/msaad00/agent-bom/compare/v0...v0.70.4Low3/11/2026
v0.70.3## What's Changed * fix: remove unsupported license field from mcp-registry server.json by @msaad00 in https://github.com/msaad00/agent-bom/pull/617 * fix: parse_fixed_version PEP 503, scan cache LRU cap, pipeline 429 cooldown by @msaad00 in https://github.com/msaad00/agent-bom/pull/618 * fix: GHSA PEP 503 normalization for advisory matching + resolver debug logging by @msaad00 in https://github.com/msaad00/agent-bom/pull/619 * fix: add logging to all bare silent exception handlers by @msaad00 iLow3/11/2026
v0.70.0## What's Changed * refactor: consolidate test files β€” merge _cov2 pairs, standardize names by @msaad00 in https://github.com/msaad00/agent-bom/pull/571 * refactor: extract MCP tool logic into mcp_tools/ package by @msaad00 in https://github.com/msaad00/agent-bom/pull/572 * refactor: extract models and middleware from api/server.py by @msaad00 in https://github.com/msaad00/agent-bom/pull/585 * refactor: extract store globals into api/stores.py (Phase 3) by @msaad00 in https://github.com/msaad00/Low3/11/2026
v0.69.1## What's Changed * fix: exception swallowers, SBOM transitives, policy dry-run by @msaad00 in https://github.com/msaad00/agent-bom/pull/532 * fix: enforce mypy type checking β€” zero errors across 28 files by @msaad00 in https://github.com/msaad00/agent-bom/pull/533 * fix: remove all mypy overrides β€” 172/172 files type-checked by @msaad00 in https://github.com/msaad00/agent-bom/pull/534 * feat: expand CIS benchmark coverage to 67 checks across AWS/Azure/GCP by @msaad00 in https://github.com/msaadLow3/11/2026
v0.68.2## What's Changed * fix: security audit findings before external review by @msaad00 in https://github.com/msaad00/agent-bom/pull/517 * chore: bump version to v0.68.2 by @msaad00 in https://github.com/msaad00/agent-bom/pull/518 **Full Changelog**: https://github.com/msaad00/agent-bom/compare/v0...v0.68.2Low3/10/2026
v0.68.1## What's Changed * fix: add Apache-2.0 license to MCP registry metadata by @msaad00 in https://github.com/msaad00/agent-bom/pull/504 * fix: update GitHub Action version in SVGs to v0.68.0 by @msaad00 in https://github.com/msaad00/agent-bom/pull/505 * fix: align PyPI description with actual stats by @msaad00 in https://github.com/msaad00/agent-bom/pull/506 * feat: Docker cross-platform hardening β€” multi-arch CI, Windows docs, SHA audit by @msaad00 in https://github.com/msaad00/agent-bom/pull/511Low3/10/2026
v0.68.0## What's Changed * feat: SBOM vendor metadata + supply chain enrichment by @msaad00 in https://github.com/msaad00/agent-bom/pull/473 * feat: AI-BOM training pipeline lineage + dataset cards by @msaad00 in https://github.com/msaad00/agent-bom/pull/474 * fix: harden URL/domain validation across codebase (CodeQL) by @msaad00 in https://github.com/msaad00/agent-bom/pull/475 * feat: compliance framework tags for training/dataset findings by @msaad00 in https://github.com/msaad00/agent-bom/pull/477 *Low3/10/2026
v0.67.0## What's Changed * feat: end-to-end alignment β€” detector parity, scan context, UI gating, Scorecard fixes by @msaad00 in https://github.com/msaad00/agent-bom/pull/451 * feat: Scorecard detection, context-aware UI, persistent asset tracker by @msaad00 in https://github.com/msaad00/agent-bom/pull/452 * chore: bump version to v0.67.0 by @msaad00 in https://github.com/msaad00/agent-bom/pull/453 **Full Changelog**: https://github.com/msaad00/agent-bom/compare/v0...v0.67.0Low3/10/2026
v0.66.0## What's Changed * chore: re-record demo GIF for v0.65.0 by @msaad00 in https://github.com/msaad00/agent-bom/pull/439 * fix: security hardening β€” atomic writes, cache eviction, TOCTOU mitigation by @msaad00 in https://github.com/msaad00/agent-bom/pull/440 * feat: README UX improvements β€” tagline, downloads badge, discussions by @msaad00 in https://github.com/msaad00/agent-bom/pull/441 * feat: CLI UX polish + MCP server discoverability by @msaad00 in https://github.com/msaad00/agent-bom/pull/442Low3/9/2026
v0.65.0## What's Changed * docs: sync all surfaces to v0.64.0 β€” browser extensions, AISVS, 23 tools by @msaad00 in https://github.com/msaad00/agent-bom/pull/424 * docs: fix stale counts in integrations, architecture, and README by @msaad00 in https://github.com/msaad00/agent-bom/pull/425 * feat: instruction file trust as headline feature (SKILL.md hero story) by @msaad00 in https://github.com/msaad00/agent-bom/pull/426 * feat: Maven pom.xml parser + Go go.mod direct/indirect distinction by @msaad00 in Low3/9/2026
v0.64.0## What's Changed * feat: dynamic MITRE ATT&CK mapping via STIX + CWE bridge by @msaad00 in https://github.com/msaad00/agent-bom/pull/386 * docs: align all description surfaces to one canonical message by @msaad00 in https://github.com/msaad00/agent-bom/pull/393 * feat: agent identity (#388), semantic injection (#387), HF model hashes (#389) by @msaad00 in https://github.com/msaad00/agent-bom/pull/394 * ci: scope fuzz workflow to fuzz/** only by @msaad00 in https://github.com/msaad00/agent-bom/pLow3/9/2026

Dependencies & License Audit

Loading dependencies...

Similar Packages

opena2aOpen-source security tools for AI agents. Find vulnerabilities, fix root causes, prove compliance.v0.8.23
ai-engineering-from-scratchLearn it. Build it. Ship it for others.0.0.0
codex_registerAutomate ChatGPT registration and extract OAuth access_token and refresh_token with email handling, Sentinel bypass, and PKCE capture0.0.0
claude-code-configClaude Code skills, architectural principles, and alternative approaches for AI-assisted development0.0.0
finance-agent-mcpAI-powered group finance assistant using MCP architecture, Gemini LLM and Streamlit.0.0.0