test pat
AI-driven security auditing and code review for ASF projects
Automated OWASP ASVS v5.0.0 compliance auditing for any GitHub-hosted codebase. Downloads source code, discovers the architecture, runs per-requirement security analysis with Claude, and produces a consolidated report with deduplicated findings and GitHub issues. In production — piloted on ATR and Apache Steve.
Automated security scan of GitHub Actions workflows across an entire GitHub organization. Combines LLM classification (which repos publish what, where) with static pattern matching (12 check types from CRITICAL to INFO) to identify exploitable workflows, supply chain risks, and policy violations. Scanned 2,500+ Apache repos.
Both pipelines run on Gofannon — see docs/gofannon for platform setup.
├── ASVS/ # ASVS security audit pipeline │ ├── agents/ # Pipeline agent code (6 agents) │ ├── audit_guidance/ # Project-specific false positive guidance │ ├── reports/ # Audit output organized by project and commit │ └── rerun-sections.sh # QA: re-run failed sections, re-consolidate ├── gha-review/ # GitHub Actions security review │ ├── agents/ # Review pipeline agents (7 agents + tests) │ └── reports/ # Review output ├── docs/ │ ├── gofannon/ # Gofannon setup and agent development guide │ ├── tooling/ # Security tooling landscape and comparisons │ ├── roadmap/ # Eval framework, multi-spec expansion plans │ └── how-to-contribute.md └── util/ # Utility scripts
Mailing list: Say hello at 📧 dev@tooling.apache.org (Subscribe by sending an email with empty subject and body to dev-subscribe@tooling.apache.org and replying to the automated response, per the ASF mailing list how-to)
Slack: #tooling-discuss on the ASF Slack
Issues: Use GitHub Issues to ask questions, suggest approaches, or report bugs
Note: Please introduce yourself on the mailing list before submitting a PR; this helps us deter spam and means your contribution won't be overlooked.
This project is licensed under the Apache License 2.0.
Part of the Apache Tooling Initiative.