tree: 95619e15d4d5ccf8d8b278ed1c1cd51e12892bd3
  1. specs/
  2. asvs-applicability.md
  3. eval-framework.md
  4. multi-spec-architecture.md
  5. README.md
docs/roadmap/README.md

Security Pipeline Roadmap

Planning documents for the security audit pipeline — where it‘s headed, how we’ll get there, and how we‘ll know it’s working.

For the current pipeline and how to use it, see the ASVS pipeline documentation. For a comparison of external tools in this space, see tooling.

Contents

ASVS Applicability

Where ASVS fits (web apps like ATR and Steve) and where it doesn't (libraries, backend services, infrastructure). Includes a chapter-by-chapter breakdown of applicability by project type, alternative standards for non-web projects, and guidance on how to frame the pipeline when offering it to ASF projects.

Eval Framework

Test harness design for measuring pipeline quality and operating at scale. Covers fixtures (known codebases with known vulns), metrics (recall, precision, false positive rate), LLM-as-judge for semantic comparison, auto-filed GitHub issues for novel errors, and operational dashboards. The ATR da901ba L1+L2 run serves as the regression baseline.

Multi-Spec Architecture

Implementation plan for Phase 0: renaming the pipeline from ASVS to security, making agents spec-agnostic, adding the spec input parameter, data store schema per spec, spec selection modes, cross-spec deduplication, and migration path. This is the prerequisite for all spec additions below.

How tooling-agents Complements ATR

How every tool in the tooling-agents portfolio — ASVS audit, GHA Review, ASF Baseline, and SLSA — fills gaps that ATR can‘t cover, and how ATR covers the distribution layer that tooling-agents doesn’t address. The three-layer model: source/CI security → build integrity → release verification.

Multi-Spec Expansion

The pipeline currently audits against OWASP ASVS only. These plans extend it to additional security specifications, with automatic spec selection based on project type.

PhaseSpecBest ForEffortPlan
DoneOWASP ASVS v5.0.0Web applicationsCompleteIn production — ATR and Steve audited
0Rename ASVS → securityAll4 daysAgent renames, spec input, cross-spec dedup
1CWE Top 25Libraries, any code~5 daysMemory safety, injection, race conditions
1OWASP API Top 10API-heavy projects~2.5 daysIDOR, mass assignment, rate limiting
2ASF Security BaselineAll ASF projects~6 days + reviewRelease signing, license compliance, ASF auth patterns
2SLSA Build LevelsPublishing projects~6 daysProvenance, reproducibility, artifact signing
3Community-contributedAnyOngoingLoad requirements into data store, no code changes

After Phase 0, adding a new spec requires no agent code changes — just requirements in the data store, an optional prompt template, and an update to the discovery agent's project type mapping.

How Specs Combine

The discovery agent classifies the project and recommends specs:

Project TypeRecommended Specs
Web app (ATR, Steve, Superset)ASVS + API Top 10 + ASF Baseline
Library (Commons, Arrow, Parquet)CWE Top 25 + ASF Baseline
API service (Solr, CouchDB)ASVS + API Top 10 + CWE Top 25 + ASF Baseline
Publishing project (Kafka, Airflow)All of the above + SLSA

The consolidator deduplicates across specs using cross-references — when ASVS 1.2.1 and CWE-79 flag the same XSS issue, the consolidated report merges them and notes both specs.