feat: SPDX 3.0.1 export, VLA rule reduction, XELO-005 + inline scan+plugin#16
Open
rangoel-nu wants to merge 6 commits intomainfrom
Open
feat: SPDX 3.0.1 export, VLA rule reduction, XELO-005 + inline scan+plugin#16rangoel-nu wants to merge 6 commits intomainfrom
rangoel-nu wants to merge 6 commits intomainfrom
Conversation
- Add SpdxExporter toolbox plugin (spdx_exporter.py) producing SPDX 3.0.1 JSON-LD aligned with the NuGuardAI validator-hardened reference format: SPDXRef- identifiers, SoftwareAgent creator, simplelicensing_LicenseExpression data license element, software_packageVersion / releaseTime / suppliedBy on every package, Relationship elements with completeness=complete, xelo: extension namespace for AI-security metadata - Add --format spdx to xelo scan CLI (local and remote scan) - Rename --format unified to --format cyclonedx-ext; add note that --format cyclonedx outputs package deps only (no AI SBOM node details) - software_downloadLocation set to the scanned repo URL / local path - Fix generated_at microseconds (models.py) - Add 79 tests for SpdxExporter covering all format invariants - Update docs: cli-reference.md, developer-guide.md, getting-started.md
- Keep only 4 rules: PHI/PII to external LLM (001), models no output validation (002), secrets in env vars (003), containers as root (004) - Renumber from old XELO-002/006/012/021 to sequential 001-004 - Remove stale helpers _gha_nodes, _iam_nodes_list, _has_wildcard_perm - Update module docstring and _RULES registry - Update tests/test_atlas_annotator.py fixture to new XELO-001 - Update .github/copilot-instructions.md next rule ID to XELO-005 - Update docs/vulnerability-scanning.md rule catalogue + worked example - Update docs/cli-reference.md plugin table
- Rule triggers on no_resource_limits security finding or deployment node metadata flag - Update module docstring, _RULES registry - Update docs/vulnerability-scanning.md catalogue, worked example - Update docs/cli-reference.md plugin table to XELO-001-005 - Bump next available rule ID to XELO-006
- True positive and negative cases for all 5 structural rules - Edge cases: multiple models, both secret issues, per-node vs summary flags - Registry tests: correct order, all rules return list, required finding keys
…ull) When --plugin is used without --output, the SBOM is silently discarded so no intermediate file is needed. Explicit --output still works as before. - cli.py: scan --output default changed to None; resolved to /dev/null when --plugin active, stdout otherwise - cli-reference.md: --output row updated to No/optional in both scan tables; Scan+Plugin example simplified to omit --output - vulnerability-scanning.md: Step 1 updated to single --plugin command
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
This PR delivers four related improvements:
1. SPDX 3.0.1 JSON-LD export (
--format spdx)xelo scan --format spdxoutput format generating spec-compliant SPDX 3.0.1 JSON-LDspdx_exporttoolbox plugin with optional SHACL validation (--config validate=true, requiresxelo[spdx])2. Vulnerability scanner — rules reduced to XELO-001–004
3. New structural rule XELO-005 (LOW) — AI workloads without resource limits
no_resource_limitssecurity finding or per-node DEPLOYMENT metadata flagmax_tokenslimits4. 34 unit tests for XELO-001–005
5. Inline scan + plugin (
--outputoptional when--pluginis set)xelo scan <target> --plugin vulnerability --plugin-config format=markdown --plugin-output findings.md--outputdefaults to/dev/nullwhen--pluginis activeTests
Docs updated
docs/vulnerability-scanning.mddocs/cli-reference.mddocs/getting-started.md(SPDX format)