2 · WHY — Why Stella Ops Exists

Explaining the concrete pain we solve, why the world needs one more DevSecOps platform, and the success signals that prove we are on the right track.

Software‑supply‑chain attacks, licence‑risk, and incomplete SBOM coverage slow teams and compliance audits to a crawl. Most existing scanners:


# 1 Free‑Tier Quota — Why 333?

The limit of 333 SBOM scans per UTC day was not chosen at random.

Constraint Analysis Outcome
SMB workload Internal survey across 37 SMBs shows median 210 container builds/day (p95 ≈ 290). 333 gives ≈ 1.6 × head‑room without forcing a paid tier.
Cost of feeds Hosting, Trivy DB mirrors & CVE merge traffic average ≈ $14 / 1 000 scans. 333/day yields <$5 infra cost per user — sustainable for an OSS project.
Incentive to upgrade Larger orgs (> 300 builds/day) gain ROI from Plus/Pro tiers anyway. Clear upsell path without hurting hobbyists.

In one sentence:  333 scans cover the daily needs of a typical small / medium business, keep free usage genuinely useful and still leave a financial runway for future development.

## 1.1 How the Quota Is Enforced (1‑minute view)

Detailed sequence living in 30_QUOTA_ENFORCEMENT_FLOW.md.


2 · Why Another DevSecOps Product? — Macro Drivers

Driver Evidence Implication for Tooling
Exploding supply‑chain attacks Sonatype 2024 report shows 742 % growth since 2020. SBOMs & provenance checks must be default, not “best‑practice”.
Regulation tsunami • US EO 14028 & NIST SP 800‑218
• EU Cyber‑Resilience Act (CRA) in force 2026
• Russian ФЗ‑187 for КИИ
Vendors must attest build provenance (SLSA) and store tamper‑proof SBOMs.
Runtime‑cost intolerance Pipelines build hundreds of images/day; waiting > 10 s per scan breaks SLA. Need delta‑aware engines that reuse layer analyses (< 1 s warm scans).
Air‑gap & sovereignty demands Finance/defence prohibit outbound traffic; data must stay on‑prem. Ship self‑contained registry + CVE DB and run offline.
Predictable free‑tier limits Teams want clarity, not surprise throttling. Provide transparent 333 scans/day quota, early banner & graceful wait‑wall.

Therefore: The market demands a modular, SBOM‑first, sub‑5 s, 100 % self‑hosted platform with a transparent free‑tier quota—precisely the niche Stella Ops targets.


3 · Gap in Current Tooling


4 · Why Stella Ops Can Win

  1. Speed First — Delta‑SBOM flow uses cached layers to hit < 1 s warm scans.
  2. Multi‑Format Ready — Auto‑detects Trivy‑JSON, SPDX‑JSON, CycloneDX‑JSON; UI lets teams choose per‑project defaults.
  3. Offline by Default — Ships an anonymous internal Docker registry (StellaOps.Registry) plus Redis, Mongo, CVE DB, and UI in a single compose up.
  4. Open & Modular — .NET hot‑load plug‑ins (StellaOpsAttestor, future scanners) under AGPL; anyone can extend.
  5. Policy as Code — YAML rules today, upgrade path to OPA/Rego with history stored in Mongo via StellaOps.MutePolicies.
  6. Sovereign‑Ready — Russian‑language UI, local vulnerability mirrors, zero telemetry by default.
  7. Honest Free‑tier Boundaries — Clear 333 scans/day limit, early banner at 200 and predictable wait‑wall—no hidden throttling.

5 · Success Criteria — Signals We Solve the Problem


6 · Non‑Goals (2025‑2027)


7 · Stakeholder Pain‑Point Recap

Persona Pain Today Stella Ops Solution
Dev “My CI fails for 45 s on every push.” < 5 s initial, < 1 s warm scans.
Sec‑Ops Separate tools for SBOM, policy, and audit. Unified UI + YAML / Rego policies with history.
Infra Internet‑blocked site; no public pulls allowed. Offline compose bundle + internal registry.
Compliance Need CRA‑ready provenance by 2026. Future StellaOpsAttestor SLSA + Rekor integration.
Budget owner Fears hidden overage charges in “free” tiers. Transparent 333 scans/day limit, visible in UI/API.

Last updated: 14 Jul 2025 (sync with free‑tier quota rev 2.0).