Explainable verdicts
Every decision includes rationale traces and score breakdowns.
Security Decisioning
Gate releases with policy evaluation, lattice VEX resolution, and deterministic verdicts. Every decision exports a signed, replayable capsule.
Scanner findings pile up. Exceptions accumulate. Six months later, nobody can explain why a CVE was marked "acceptable."
VEXVulnerability Exploitability eXchange - machine-readable statements about whether vulnerabilities are actually exploitable in your context as blind suppression — "mark as not affected"VEXVulnerability Exploitability eXchange - machine-readable statements about whether vulnerabilities are actually exploitable in your context as state — conflicts are detected and trackedNot blind suppression. A 5-state lattice with trust weighting, conflict detection, and exportable rationale.
VEX statements resolve through a trust-weighted lattice. Conflicts are first-class state, not hidden errors.
Fixed
Not Affected
Affected
Conflict
Unknown
9 factors: issuer authority, specificity, freshness, and more.
Contradictory claims flagged for resolution, not silently merged.
14-day half-life ensures stale claims lose influence.
RedHat, Ubuntu, Oracle, MSRC, Cisco, SUSE, VMware.
Audit-grade explainability for every consensus.
Visual resolution for conflicting VEX claims.
10+ gate types with Belnap K4 four-valued logic. True, False, Both, and Neither are all valid states.
CVSSCommon Vulnerability Scoring System - a severity rating from 0-10 indicating how critical a vulnerability is, EPSSExploit Prediction Scoring System - a probability score (0-100%) predicting how likely a vulnerability is to be exploited in the wild)ReachabilityAnalysis that proves whether vulnerable code is actually called by your application — filtering out false positives from scanner noise requirement for criticalsOPAOpen Policy Agent — an open-source policy engine that enables fine-grained, context-aware policy enforcement across the stack/Rego integration for custom rulesCVSSCommon Vulnerability Scoring System - a severity rating from 0-10 indicating how critical a vulnerability is v4.0, EPSSExploit Prediction Scoring System - a probability score (0-100%) predicting how likely a vulnerability is to be exploited in the wild v4 probabilityKEVKnown Exploited Vulnerabilities - CISA's catalog of vulnerabilities actively exploited in the wild (Known Exploited) detectionReachabilityAnalysis that proves whether vulnerable code is actually called by your application — filtering out false positives from scanner noise-aware gate multipliersEvery gate evaluation produces a sealed, exportable evidence bundle. Six months later, replay the exact decision.
SBOMSoftware Bill of Materials - a complete list of all packages and dependencies in your software snapshotReachabilityAnalysis that proves whether vulnerable code is actually called by your application — filtering out false positives from scanner noise evidenceVEXVulnerability Exploitability eXchange - machine-readable statements about whether vulnerabilities are actually exploitable in your context state (lattice-resolved)$ stella replay decision-capsule-2026-01-15.yaml --verify
Replaying decision from 2026-01-15T14:32:00Z...
Policy version: sha256:e5f6g7h8... (matches)
Feed snapshot: sha256:i9j0k1l2... (matches)
VEX state: sha256:m3n4o5p6... (matches)
Verdict: ALLOW (identical to original)
Determinism check: PASSED
Same inputs → Same outputs. Audit-ready. DSSEDead Simple Signing Envelope - a simple, flexible standard for signing arbitrary data with cryptographic signatures envelope signing with in-totoA framework for securing the software supply chain by verifying that each step was carried out as planned and by authorized actorsSigstoreOpen-source project providing free code signing and transparency log infrastructure for the software supply chain/FulcioRekorTransparency log from Sigstore that provides an immutable, tamper-resistant ledger of software signatures transparency log integrationSBOMSoftware Bill of Materials - a complete list of all packages and dependencies in your software, VEXVulnerability Exploitability eXchange - machine-readable statements about whether vulnerabilities are actually exploitable in your context, reachability predicatesSLSASupply-chain Levels for Software Artifacts — a framework for ensuring the integrity of software artifacts throughout the supply chain provenance v1.0Every decision includes rationale traces and score breakdowns.
Uncertainty is tracked and budgeted, not hidden or ignored.
Same inputs, same outputs. Prove any decision months later.
Start with policy setup and your first gate evaluation.