11# Argus Security
22
3- ** Enterprise-grade AI Security Platform ** -- Orchestrate security scanners with AI-powered triage and multi-agent analysis.
3+ ** AI-powered security pipeline that orchestrates scanners, triages findings with LLMs, and cuts false positives by 60-70%. **
44
55[ ![ License: MIT] ( https://img.shields.io/badge/License-MIT-blue.svg )] ( LICENSE )
66[ ![ AI-Powered] ( https://img.shields.io/badge/AI-Claude%20%7C%20OpenAI%20%7C%20Ollama-blue.svg )] ( #ai-providers )
77[ ![ Docker] ( https://img.shields.io/badge/Docker-Ready-blue.svg )] ( #docker )
8+ [ ![ Scanners] ( https://img.shields.io/badge/Scanners-5%20integrated-green.svg )] ( #scanners )
9+ [ ![ Enrichment] ( https://img.shields.io/badge/Enrichment-20%2B%20modules-purple.svg )] ( #enrichment-features )
810
911---
1012
11- ## What is Argus?
13+ ## The Problem
1214
13- Argus runs a ** 6-phase security pipeline ** that combines traditional scanners with Claude AI-powered triage, achieving ** 60-70% false positive reduction ** and ** +15-20% more findings ** via heuristic-based discovery .
15+ Traditional security scanners generate hundreds of findings. Most are noise. Teams waste hours triaging, miss real issues buried in false positives, and get zero actionable remediation guidance .
1416
15- | Challenge | Argus Solution |
16- | -----------| ----------------|
17- | Too many false positives | 60-70% reduction via AI triage + noise scoring |
18- | Scanners miss real issues | +15-20% findings via heuristic pattern matching |
19- | Manual triage takes hours | Automated multi-agent analysis with 5 AI personas |
20- | No actionable next steps | AI-generated fix suggestions + compliance mapping |
17+ ## How Argus Solves It
18+
19+ Argus runs ** 5 scanners in parallel** , then passes findings through ** AI-powered triage** with ** 5 specialized agent personas** that debate severity, filter false positives, and generate fix suggestions.
20+
21+ | Before Argus | After Argus |
22+ | --------------| -------------|
23+ | 500+ raw findings, mostly noise | 60-70% false positive reduction |
24+ | Scanners miss logic bugs | +15-20% more findings via heuristic + AI discovery |
25+ | Manual triage takes hours | Automated multi-agent analysis in minutes |
26+ | No fix guidance | AI-generated remediation + compliance mapping |
27+ | Point-in-time scans | Persistent findings store with regression detection |
2128
2229---
2330
@@ -46,19 +53,23 @@ jobs:
4653### Docker
4754
4855` ` ` bash
49- # Full 6-phase pipeline (Dockerfile.complete entrypoint: hybrid_analyzer.py)
5056docker build -f Dockerfile.complete -t argus:complete .
5157docker run -v $(pwd):/workspace \
5258 -e ANTHROPIC_API_KEY="your-key" \
5359 argus:complete /workspace
60+ ```
5461
55- # With Docker-in-Docker for Phase 4 sandbox validation
62+ <details >
63+ <summary >With Docker-in-Docker (Phase 4 sandbox validation)</summary >
64+
65+ ``` bash
5666docker run -v $( pwd) :/workspace \
5767 -v /var/run/docker.sock:/var/run/docker.sock \
5868 --group-add $( stat -c ' %g' /var/run/docker.sock) \
5969 -e ANTHROPIC_API_KEY=" your-key" \
6070 argus:complete /workspace
6171```
72+ </details >
6273
6374### Local CLI
6475
@@ -80,77 +91,128 @@ python scripts/hybrid_analyzer.py /path/to/project
8091
8192```
8293Phase 1: Scanner Orchestration (30-60s)
83- Semgrep (SAST, 2000+ rules) | Trivy (CVE/deps) | Checkov (IaC) | TruffleHog (verified secrets) | Gitleaks (pattern secrets)
94+ ├── Semgrep SAST with 2000+ rules
95+ ├── Trivy CVE and dependency scanning
96+ ├── Checkov IaC security (Terraform, K8s, CloudFormation)
97+ ├── TruffleHog Verified secret detection (API-confirmed)
98+ ├── Gitleaks Pattern-based secret detection
99+ ├── Nuclei Source-aware DAST template analysis
100+ └── ZAP Baseline Passive security checks (opt-in)
84101
85102Phase 2: AI Enrichment (2-5 min)
86- Claude/OpenAI/Ollama triage | Noise scoring | CWE mapping | Heuristic discovery (regex)
103+ ├── Claude/OpenAI/Ollama triage with noise scoring
104+ ├── CWE mapping and risk scoring
105+ ├── Heuristic discovery (regex pattern matching)
106+ └── IRIS semantic analysis (arXiv 2405.17238)
87107
88108Phase 3: Multi-Agent Review
89- 5 AI personas: SecretHunter, ArchitectureReviewer, ExploitAssessor, FalsePositiveFilter, ThreatModeler
90- Quality agents run in parallel via ThreadPoolExecutor
109+ ├── SecretHunter Secret validation specialist
110+ ├── ArchitectureReviewer Design flaw detection
111+ ├── ExploitAssessor Exploitability analysis
112+ ├── FalsePositiveFilter Noise elimination
113+ ├── ThreatModeler Attack surface mapping
114+ └── Collaborative reasoning with multi-agent debate
91115
92116Phase 4: Sandbox Validation
93- Docker-based exploit verification | LLM-generated PoC exploits (opt-in)
117+ ├── Docker-based exploit verification
118+ └── LLM-generated PoC exploits (opt-in)
94119
95120Phase 5: Policy Gates
96- Rego/OPA enforcement | PR gates block verified secrets + critical CVEs
121+ └── Rego/OPA enforcement — block verified secrets + critical CVEs
97122
98123Phase 6: Reporting
99- SARIF (GitHub code scanning) | JSON | Markdown
124+ ├── SARIF (GitHub Code Scanning integration)
125+ ├── JSON (programmatic access)
126+ └── Markdown (PR comments)
100127```
101128
102129### Two Orchestrators
103130
104- | Orchestrator | Use Case | Scanners |
105- | -------------| ----------| ----------|
106- | ` run_ai_audit.py ` | Fast AI code review (GitHub Action default) | Semgrep + 2-3 LLM calls |
107- | ` hybrid_analyzer.py ` | Full 6-phase pipeline (Docker default) | All 5 scanners + full enrichment |
131+ | Orchestrator | Use Case | What Runs |
132+ | -------------| ----------| ----------- |
133+ | ` run_ai_audit.py ` | Fast AI code review (GitHub Action default) | Semgrep + heuristics + 2-3 LLM calls |
134+ | ` hybrid_analyzer.py ` | Full 6-phase pipeline (Docker default) | All scanners + full enrichment pipeline |
108135
109136---
110137
111- ## Enrichment Features
138+ ## Scanners
139+
140+ 5 scanners are fully wired and run in parallel during Phase 1:
141+
142+ | Scanner | Detection Type | Default |
143+ | ---------| ---------------| ---------|
144+ | ** Semgrep** | SAST — code patterns, injection flaws, auth issues | On |
145+ | ** Trivy** | SCA — CVEs, outdated dependencies, license risks | On |
146+ | ** Checkov** | IaC — Terraform, K8s, CloudFormation misconfigs | On |
147+ | ** TruffleHog** | Secrets — API-verified credential detection | On |
148+ | ** Gitleaks** | Secrets — pattern-based detection (complements TruffleHog) | On |
149+
150+ Optional DAST scanners (require target URL or binary):
112151
113- All features are wired into both orchestrators and toggled via config/env vars.
114-
115- | Feature | Config Key | Default | Description |
116- | ---------| -----------| ---------| -------------|
117- | EPSS Scoring | ` enable_epss_scoring ` | ` True ` | FIRST.org exploit probability (24h cache, batch 100) |
118- | Fix Version Tracking | ` enable_fix_version_tracking ` | ` True ` | Semver upgrade paths (PATCH/MINOR/MAJOR) |
119- | VEX Support | ` enable_vex ` | ` True ` | OpenVEX, CycloneDX, CSAF document parsing |
120- | Vuln Deduplication | ` enable_vuln_deduplication ` | ` True ` | Cross-scanner merge via {VulnID, Pkg, Version, Path} |
121- | Advanced Suppression | ` enable_advanced_suppression ` | ` True ` | ` .argus-ignore.yml ` with time-based expiration |
122- | Compliance Mapping | ` enable_compliance_mapping ` | ` True ` | NIST 800-53, PCI DSS 4.0, OWASP Top 10, SOC 2, ISO 27001 |
123- | License Risk Scoring | ` enable_license_risk_scoring ` | ` True ` | 5-tier SPDX classification (32 identifiers) |
124- | Heuristic Scanner | ` enable_heuristics ` | ` True ` | Pre-LLM regex pattern matching for extra findings |
125- | Phase Gating | ` enable_phase_gating ` | ` True ` | Schema validation between pipeline phases |
126- | Smart Retry | ` enable_smart_retry ` | ` True ` | Classified retry strategies per error type |
127- | Audit Trail | ` enable_audit_trail ` | ` True ` | Per-agent cost/duration tracking, session.json |
128- | Parallel Agents | ` enable_parallel_agents ` | ` True ` | Quality agents run concurrently (~ 60% faster Phase 3) |
129- | Deep Analysis | ` deep_analysis_mode ` | ` off ` | AISLE-inspired semantic analysis (off/semantic-only/conservative/full) |
130- | Proof-by-Exploitation | ` enable_proof_by_exploitation ` | ` False ` | LLM-generated PoCs in Docker sandbox (opt-in) |
131- | MCP Server | ` enable_mcp_server ` | ` False ` | Expose Argus as MCP tools for Claude Code |
132- | Temporal Orchestration | ` enable_temporal ` | ` False ` | Durable workflow wrapping for crash recovery |
133-
134- ### Continuous Security Testing (v3.0)
135-
136- | Feature | Config Key | Default | Description |
137- | ---------| -----------| ---------| -------------|
138- | Diff-Intelligent Scoping | ` enable_diff_scoping ` | ` True ` | Scope scanners to changed files + blast radius expansion |
139- | Application Context | ` enable_app_context ` | ` True ` | Auto-detect framework, auth, cloud, IaC for context-aware scanning |
140- | Persistent Findings Store | ` enable_findings_store ` | ` True ` | SQLite cross-scan intelligence with regression detection and trending |
141- | Cross-Component Analysis | ` enable_cross_component_analysis ` | ` True ` | Detect dangerous vulnerability combinations across architectural boundaries |
142- | Agent Chain Discovery | ` enable_agent_chain_discovery ` | ` False ` | LLM-powered multi-step attack chain reasoning (opt-in, uses AI credits) |
143- | AutoFix PR Generation | ` enable_autofix_pr ` | ` False ` | Generate merge-ready fix PRs with closed-loop verification (opt-in) |
144- | SAST-to-DAST Validation | ` enable_live_validation ` | ` False ` | Validate SAST findings against live staging targets (opt-in) |
152+ | Scanner | Detection Type | Default |
153+ | ---------| ---------------| ---------|
154+ | ** Nuclei** | Source-aware DAST template analysis | On |
155+ | ** ZAP Baseline** | Passive security header/config checks | Off |
156+ | ** DAST Orchestrator** | Coordinated Nuclei + ZAP scanning | Off |
145157
146158---
147159
160+ ## Enrichment Features
161+
162+ These modules enrich findings after scanner results are collected. All are wired into ` hybrid_analyzer.py ` and toggled via config/env vars.
163+
164+ | Feature | Config Key | Default | What It Does |
165+ | ---------| -----------| ---------| --------------|
166+ | EPSS Scoring | ` enable_epss_scoring ` | On | FIRST.org exploit probability scores (24h cache, batch 100) |
167+ | Fix Version Tracking | ` enable_fix_version_tracking ` | On | Semver upgrade paths — PATCH/MINOR/MAJOR effort classification |
168+ | VEX Support | ` enable_vex ` | On | OpenVEX, CycloneDX, CSAF document parsing |
169+ | Vuln Deduplication | ` enable_vuln_deduplication ` | On | Cross-scanner merge via {VulnID, Pkg, Version, Path} |
170+ | Advanced Suppression | ` enable_advanced_suppression ` | On | ` .argus-ignore.yml ` with time-based expiration, path globs, CWE match |
171+ | Compliance Mapping | ` enable_compliance_mapping ` | On | NIST 800-53, PCI DSS 4.0, OWASP Top 10, SOC 2, ISO 27001 |
172+ | License Risk Scoring | ` enable_license_risk_scoring ` | On | 5-tier SPDX classification (32 identifiers) |
173+ | Heuristic Scanner | ` enable_heuristics ` | On | Pre-LLM regex pattern matching for findings beyond scanner rules |
174+ | Phase Gating | ` enable_phase_gating ` | On | Schema validation between pipeline phases |
175+ | Smart Retry | ` enable_smart_retry ` | On | Classified retry strategies per error type |
176+ | Audit Trail | ` enable_audit_trail ` | On | Per-agent cost/duration tracking, session.json |
177+ | Parallel Agents | ` enable_parallel_agents ` | On | Quality agents run concurrently (~ 60% faster Phase 3) |
178+ | IRIS Semantic Analysis | ` enable_iris ` | On | Research-proven semantic analysis (arXiv 2405.17238) |
179+ | Collaborative Reasoning | ` enable_collaborative_reasoning ` | On | Multi-agent debate for contested findings |
180+ | Deep Analysis | ` deep_analysis_mode ` | off | AISLE-inspired semantic analysis (off/semantic-only/conservative/full) |
181+ | Proof-by-Exploitation | ` enable_proof_by_exploitation ` | Off | LLM-generated PoCs validated in Docker sandbox |
182+ | MCP Server | ` enable_mcp_server ` | Off | Expose Argus as MCP tools for Claude Code |
183+ | Temporal Orchestration | ` enable_temporal ` | Off | Durable workflow wrapping for crash recovery |
184+
185+ ### Continuous Security (v3.0)
186+
187+ | Feature | Config Key | Default | What It Does |
188+ | ---------| -----------| ---------| --------------|
189+ | Diff-Intelligent Scoping | ` enable_diff_scoping ` | On | Scope scanners to changed files + blast radius expansion |
190+ | Application Context | ` enable_app_context ` | On | Auto-detect framework, auth, cloud, IaC for context-aware scanning |
191+ | Persistent Findings Store | ` enable_findings_store ` | On | SQLite cross-scan intelligence with regression detection and MTTF |
192+ | Cross-Component Analysis | ` enable_cross_component_analysis ` | On | Detect dangerous vuln combinations across architecture boundaries |
193+ | Agent Chain Discovery | ` enable_agent_chain_discovery ` | Off | LLM-powered multi-step attack chain reasoning |
194+ | AutoFix PR Generation | ` enable_autofix_pr ` | Off | Generate merge-ready fix PRs with closed-loop verification |
195+ | SAST-to-DAST Validation | ` enable_live_validation ` | Off | Validate SAST findings against live staging targets |
196+
148197### Deployment-Triggered Scanning
149198
150- Argus includes two GitHub Actions workflows for continuous security:
199+ - ** Post-Deploy Scan** (` .github/workflows/post-deploy-scan.yml ` ) — Triggers on successful deployments. Runs diff-scoped SAST + DAST against the deployment URL.
200+ - ** Retest After Fix** (` .github/workflows/argus-retest.yml ` ) — Triggers when ` argus/fix-* ` branches merge. Re-scans to verify fixes hold, updates FindingsStore, posts results as PR comments.
201+
202+ ---
203+
204+ ## Audited Projects
205+
206+ Argus has been used to scan real-world open-source projects:
207+
208+ | Project | Findings | Key Issues |
209+ | ---------| ----------| ------------|
210+ | [ MoonshotAI/kimi-cli] ( https://github.com/MoonshotAI/kimi-cli ) | 35 (5 high) | IDOR on session endpoints, 7 dependency CVEs |
211+ | [ anthropics/chrome-devtools-mcp] ( https://github.com/anthropics/chrome-devtools-mcp ) | 1 (medium) | Missing security headers |
212+ | [ juice-shop/juice-shop] ( https://github.com/juice-shop/juice-shop ) | 1 (high) | Unquoted XSS attribute in template |
213+ | DVWA | Full pentest | Comprehensive vulnerability assessment |
151214
152- - ** Post-Deploy Scan** (` .github/workflows/post-deploy-scan.yml ` ) -- Triggers on successful deployments. Runs diff-scoped SAST + DAST against the deployment URL.
153- - ** Retest After Fix** (` .github/workflows/argus-retest.yml ` ) -- Triggers when ` argus/fix-* ` branches merge. Re-scans to verify fixes hold, updates FindingsStore, posts results as PR comments.
215+ Reports include SARIF, JSON, Markdown, and responsible disclosure templates.
154216
155217---
156218
@@ -174,25 +236,25 @@ export OLLAMA_ENDPOINT="http://localhost:11434" # Ollama (free, local)
174236export ENABLE_SEMGREP=true
175237export ENABLE_TRIVY=true
176238export ENABLE_CHECKOV=true
239+ export ENABLE_TRUFFLEHOG=true
177240export ENABLE_GITLEAKS=true
178241
179- # Feature toggles (all boolean, set "true" or "false" )
242+ # Feature toggles (all boolean)
180243export ENABLE_EPSS_SCORING=true
181244export ENABLE_VEX=true
182245export ENABLE_VULN_DEDUPLICATION=true
183246export ENABLE_ADVANCED_SUPPRESSION=true
184247export ENABLE_COMPLIANCE_MAPPING=true
185248export ENABLE_LICENSE_RISK_SCORING=true
186249
187- # Continuous security testing (v3.0)
250+ # Continuous security (v3.0)
188251export ENABLE_DIFF_SCOPING=true
189252export ENABLE_APP_CONTEXT=true
190253export ENABLE_FINDINGS_STORE=true
191254export ENABLE_CROSS_COMPONENT_ANALYSIS=true
192255export ENABLE_AGENT_CHAIN_DISCOVERY=false # opt-in, uses AI credits
193256export ENABLE_AUTOFIX_PR=false # opt-in
194- export ENABLE_LIVE_VALIDATION=false # opt-in, requires staging target
195- export LIVE_VALIDATION_ENVIRONMENT=staging
257+ export ENABLE_LIVE_VALIDATION=false # opt-in, requires staging target
196258
197259# Limits
198260export MAX_FILES=50
@@ -243,7 +305,8 @@ The Action supports two pipeline modes:
243305| ` cost-limit ` | ` 1.0 ` | Max cost in USD per run |
244306| ` severity-filter ` | -- | Comma-separated severity levels to include |
245307
246- ### Full Pipeline Example
308+ <details >
309+ <summary >Full Pipeline Example</summary >
247310
248311``` yaml
249312- uses : devatsecure/Argus-Security@v1
@@ -254,6 +317,7 @@ The Action supports two pipeline modes:
254317 deep-analysis-mode : conservative
255318 fail-on-blockers : ' true'
256319` ` `
320+ </details>
257321
258322### Action Outputs
259323
@@ -270,26 +334,26 @@ The Action supports two pipeline modes:
270334
271335---
272336
273- # # CLI Commands
337+ # # CLI
274338
275339| Command | Purpose |
276340|---------|---------|
277341| `python scripts/run_ai_audit.py [path] [type]` | Fast AI code review |
278342| `python scripts/hybrid_analyzer.py [path]` | Full 6-phase pipeline |
279343| `./scripts/argus gate --stage pr --input findings.json` | Apply policy gate |
280- | `./scripts/argus feedback record <id> --mark fp` | Record false positive feedback |
344+ | `./scripts/argus feedback record <id> --mark fp` | Record false positive |
281345
282346---
283347
284348# # Performance
285349
286- | Metric | Value |
287- |--------|-------|
288- | Scan Time (first run) | 3-5 minutes |
289- | Cached Repeat | 30-90 seconds |
290- | False Positive Reduction | 60-70% |
291- | Additional Findings | +15-20% |
292- | Cost per Scan | ~$0.35 (Claude) |
350+ | Metric | Fast Mode | Full Pipeline |
351+ |--------|-----------|--------------- |
352+ | Scan Time | 30-90 seconds | 3-5 minutes (first run) |
353+ | AI Calls | 2-3 LLM calls | Full enrichment + multi-agent |
354+ | False Positive Reduction | Basic | 60-70% |
355+ | Additional Findings | Heuristic only | +15-20% (heuristic + AI) |
356+ | Cost per Scan | ~$0.10 | ~$0. 35 (Claude) |
293357
294358---
295359
@@ -324,6 +388,6 @@ MIT License -- see [LICENSE](LICENSE)
324388
325389---
326390
327- **Argus Security** -- Enterprise-grade AI Security Platform
391+ **Argus Security** -- AI-powered security pipeline for real-world vulnerability detection.
328392
329- [Quick Start](#quick-start) | [Pipeline](#6-phase-pipeline) | [Configuration ](#configuration ) | [GitHub Action ](#github-action ) | [Documentation ](#documentation )
393+ [Quick Start](#quick-start) | [Pipeline](#6-phase-pipeline) | [Scanners ](#scanners ) | [Configuration ](#configuration ) | [Audited Projects ](#audited-projects )
0 commit comments