Stella Ops - Complete Features Catalog

Comprehensive table of every capability in the platform.

For competitive differentiation highlights, see key-features.md. For tier-based pricing details, see FEATURE_MATRIX.md.


Legend

SymbolMeaning
YAvailable
-Not available
LimitedPartial functionality
ComingPlanned feature

Tiers: Free (F), Community ©, Enterprise (E)


Table of Contents

  1. Container & Image Scanning
  2. Package Detection - Operating Systems
  3. Package Detection - Language Ecosystems
  4. Vulnerability Data Sources
  5. Vulnerability Enrichment
  6. SBOM Capabilities
  7. Output Formats
  8. Filtering & Thresholds
  9. VEX Processing
  10. Reachability Analysis
  11. Secrets Detection
  12. Policy Engine
  13. Policy Gates
  14. Risk Scoring
  15. Comparison & Diff
  16. Deterministic Replay
  17. Attestation & Signing
  18. Cryptography Profiles
  19. Offline & Air-Gap
  20. Verification
  21. Authentication
  22. Authorization & Access Control
  23. Evidence Management
  24. Observability
  25. Notifications
  26. CI/CD Integration
  27. Registry Integration
  28. Deployment Options
  29. Storage & Infrastructure
  30. Web UI Features

1. Container & Image Scanning

FeatureDescriptionHow to UseFCE
Scan image by tagScan container image using registry tagstella scan --image registry/app:tagYYY
Scan image by digestScan container image using content-addressable digeststella scan --image registry/app@sha256:...YYY
Scan local Docker imageScan image from local Docker daemonstella scan --image myapp:localYYY
Scan filesystemScan extracted container rootfs directorystella scan --rootfs /path/to/rootfsYYY
Scan tar archiveScan container image from .tar.gz archivestella scan --archive image.tar.gzYYY
Layer-by-layer analysisAnalyze each container layer separatelyAutomatic during scanYYY
Base image detectionIdentify the base image usedAutomatic during scanYYY
Base image separationSeparate base image vulns from app vulns--show-layers flagYYY
Delta-SBOM cachingCache layer SBOMs for faster warm scansConfigure in scanner.yaml-YY
Sub-second warm scansAchieve <1s scan times for cached imagesAutomatic with caching-YY
Concurrent scan workersRun multiple scans in parallelConfigure scanner.workers13Unlimited
Scan queue managementQueue and prioritize scan jobsConfigure in scheduler.yaml-YY
Scan timeout controlSet maximum scan duration--timeout 300YYY
Scan retry on failureAutomatically retry failed scansConfigure in scanner.yaml-YY

2. Package Detection - Operating Systems

FeatureDescriptionHow to UseFCE
Alpine APK packagesDetect packages from Alpine LinuxAutomaticYYY
Debian dpkg packagesDetect packages from Debian/UbuntuAutomaticYYY
Ubuntu packagesDetect packages from UbuntuAutomaticYYY
RHEL RPM packagesDetect packages from Red Hat Enterprise LinuxAutomaticYYY
CentOS RPM packagesDetect packages from CentOSAutomaticYYY
Fedora RPM packagesDetect packages from FedoraAutomaticYYY
Rocky Linux packagesDetect packages from Rocky LinuxAutomaticYYY
AlmaLinux packagesDetect packages from AlmaLinuxAutomaticYYY
Oracle Linux packagesDetect packages from Oracle LinuxAutomaticYYY
Amazon Linux packagesDetect packages from Amazon LinuxAutomaticYYY
SUSE zypper packagesDetect packages from SUSE/openSUSEAutomaticYYY
Arch Linux pacmanDetect packages from Arch LinuxAutomaticYYY
Photon OS packagesDetect packages from VMware Photon OSAutomaticYYY
CBL-Mariner packagesDetect packages from Microsoft CBL-MarinerAutomaticYYY
Wolfi packagesDetect packages from WolfiAutomaticYYY
Chainguard packagesDetect packages from Chainguard imagesAutomaticYYY

3. Package Detection - Language Ecosystems

FeatureDescriptionHow to UseFCE
npm packagesDetect Node.js npm packagesAutomatic from package-lock.jsonYYY
yarn packagesDetect Node.js yarn packagesAutomatic from yarn.lockYYY
pnpm packagesDetect Node.js pnpm packagesAutomatic from pnpm-lock.yamlYYY
Python pip packagesDetect pip packagesAutomatic from requirements.txtYYY
Python poetry packagesDetect poetry packagesAutomatic from poetry.lockYYY
Python pipenv packagesDetect pipenv packagesAutomatic from Pipfile.lockYYY
Python conda packagesDetect conda packagesAutomatic from conda-lock.ymlYYY
Java Maven dependenciesDetect Maven dependenciesAutomatic from pom.xmlYYY
Java Gradle dependenciesDetect Gradle dependenciesAutomatic from build.gradleYYY
Java JAR analysisAnalyze embedded JARs for dependenciesAutomaticYYY
Java WAR/EAR analysisAnalyze web archives for dependenciesAutomaticYYY
Go modulesDetect Go module dependenciesAutomatic from go.mod, go.sumYYY
.NET NuGet packagesDetect NuGet packagesAutomatic from *.csproj, packages.configYYY
.NET deps.json analysisAnalyze .NET deps.json filesAutomaticYYY
Ruby Bundler gemsDetect Ruby gemsAutomatic from Gemfile.lockYYY
Rust Cargo cratesDetect Rust cratesAutomatic from Cargo.lockYYY
PHP Composer packagesDetect Composer packagesAutomatic from composer.lockYYY
Bun packagesDetect Bun packagesAutomatic from bun.lockbYYY
Deno importsDetect Deno importsAutomatic from deno.json, import_map.jsonYYY
Swift packagesDetect Swift Package Manager packagesAutomatic from Package.resolvedYYY
Conan packagesDetect C/C++ Conan packagesAutomatic from conanfile.txtYYY
vcpkg packagesDetect C/C++ vcpkg packagesAutomatic from vcpkg.jsonYYY
Hex packagesDetect Elixir Hex packagesAutomatic from mix.lockYYY
Pub packagesDetect Dart/Flutter packagesAutomatic from pubspec.lockYYY
Transitive dependenciesMap complete dependency treeAutomaticYYY
Dependency path trackingShow how each dependency was introducedIn scan outputYYY
License detectionIdentify package licensesAutomatic, show with --licensesYYY
Binary fingerprintingIdentify packages from compiled binaries--binary-analysis-YY
Symbol extractionExtract symbol tables from binariesAutomatic with binary analysis-YY

4. Vulnerability Data Sources

FeatureDescriptionHow to UseFCE
NVD (NIST)National Vulnerability DatabaseConfigure in concelier.yamlYYY
GitHub Security AdvisoriesGHSA ecosystem advisoriesConfigure with GITHUB_PATYYY
OSV databaseOpen Source VulnerabilitiesAutomaticYYY
Alpine SecDBAlpine Linux security databaseAutomaticYYY
Debian Security TrackerDebian vulnerability trackerAutomaticYYY
Ubuntu USNUbuntu Security NoticesAutomaticYYY
Red Hat OVALRed Hat security dataAutomaticYYY
Red Hat Security ErrataRHEL security errataAutomaticYYY
SUSE OVALSUSE security dataAutomaticYYY
Amazon Linux SecurityAmazon Linux advisoriesAutomaticYYY
Oracle Linux OVALOracle Linux security dataAutomaticYYY
Photon Security AdvisoriesVMware Photon advisoriesAutomaticYYY
Wolfi Security AdvisoriesWolfi security dataAutomaticYYY
CISA KEVKnown Exploited Vulnerabilities catalogAutomaticYYY
Custom advisory feedsImport custom advisory sourcesConfigure in concelier.yaml-YY
Advisory feed schedulingConfigure update frequencyConfigure in concelier.yaml-YY
Advisory feed mirroringMirror feeds locallyConfigure Mirror service--Y

5. Vulnerability Enrichment

FeatureDescriptionHow to UseFCE
CVSS v2.0 scoresInclude CVSS 2.0 base scoresAutomaticYYY
CVSS v3.0 scoresInclude CVSS 3.0 base scoresAutomaticYYY
CVSS v3.1 scoresInclude CVSS 3.1 base scoresAutomaticYYY
CVSS v4.0 scoresInclude CVSS 4.0 base scoresAutomaticYYY
CVSS environmental metricsApply environmental contextConfigure CVSS policy-YY
CVSS temporal metricsApply temporal contextAutomatic from feed dataYYY
KEV flaggingFlag Known Exploited VulnerabilitiesAutomaticYYY
EPSS scoresExploit Prediction Scoring SystemAutomaticYYY
EPSS percentileShow EPSS percentile rankingAutomaticYYY
Exploit maturityShow exploit availability statusAutomaticYYY
Proof of concept availableFlag when PoC existsAutomaticYYY
Weaponized exploitFlag weaponized exploitsAutomaticYYY
In-the-wild exploitationFlag active exploitationAutomatic from KEV + feedsYYY
Fix availableShow if fix version existsAutomaticYYY
Fix versionShow the version that fixes the vulnAutomaticYYY
Vendor advisory linksLink to vendor advisoriesAutomaticYYY
CWE mappingMap to CWE weakness typesAutomaticYYY
CAPEC mappingMap to CAPEC attack patternsAutomatic-YY

6. SBOM Capabilities

FeatureDescriptionHow to UseFCE
CycloneDX 1.7 generationGenerate CycloneDX 1.7 SBOMs--sbom-out sbom.json --sbom-format cyclonedxYYY
CycloneDX 1.6 generationGenerate CycloneDX 1.6 SBOMs--sbom-format cyclonedx-1.6YYY
CycloneDX 1.5 generationGenerate CycloneDX 1.5 SBOMs--sbom-format cyclonedx-1.5YYY
SPDX 3.0.1 generationGenerate SPDX 3.0.1 SBOMs--sbom-format spdxYYY
SPDX 2.3 generationGenerate SPDX 2.3 SBOMs--sbom-format spdx-2.3YYY
SPDX-JSON generationGenerate SPDX JSON format--sbom-format spdx-jsonYYY
SBOM auto-format detectionDetect format of imported SBOMsAutomaticYYY
SBOM import (CycloneDX)Import CycloneDX SBOMsstella scan --sbom file.jsonYYY
SBOM import (SPDX)Import SPDX SBOMsstella scan --sbom file.spdxYYY
SBOM import (Trivy JSON)Import Trivy JSON formatstella scan --sbom trivy.jsonYYY
SBOM validationValidate SBOM structureAutomatic on importYYY
SBOM normalizationNormalize imported SBOMsAutomaticYYY
SBOM deduplicationDeduplicate SBOM componentsAutomaticYYY
SBOM storageStore SBOMs in central repositoryAutomatic via SbomService-YY
SBOM versioningTrack SBOM versions over timeVia SbomService API-YY
SBOM lineage trackingTrack SBOM lineage across buildsVia Lineage API--Y
SBOM traversal queriesQuery SBOM history and relationshipsVia Lineage API--Y
SBOM retention policiesConfigure SBOM retention periodsConfigure in sbom-service.yaml-YY

7. Output Formats

FeatureDescriptionHow to UseFCE
Table outputHuman-readable table format--output table (default)YYY
JSON outputMachine-readable JSON--output jsonYYY
SARIF outputStatic Analysis Results Format--output sarifYYY
CycloneDX VEX outputCycloneDX VEX format--output cdx-vexYYY
OpenVEX outputOpenVEX format--output openvexYYY
CSV outputComma-separated values--output csvYYY
Markdown outputMarkdown formatted report--output markdownYYY
HTML outputHTML formatted report--output html-YY
PDF outputPDF formatted reportVia Export Center--Y
Excel outputExcel spreadsheet formatVia Export Center--Y
Template-based outputCustom output templatesConfigure templates--Y
Output to fileWrite output to file--output-file results.jsonYYY
Output to stdoutWrite output to stdoutDefault behaviorYYY
Quiet modeSuppress non-essential output--quietYYY
Verbose modeShow detailed output--verboseYYY

8. Filtering & Thresholds

FeatureDescriptionHow to UseFCE
Filter by severityShow only specific severity levels--severity CRITICAL,HIGHYYY
Minimum severitySet minimum severity threshold--min-severity HIGHYYY
Fixable onlyShow only vulns with available fixes--fixableYYY
Unfixed onlyShow only vulns without fixes--unfixedYYY
Filter by packageFilter by package name pattern--package "log4j*"YYY
Filter by CVEFilter by CVE ID pattern--cve "CVE-2024-*"YYY
Filter by CWEFilter by CWE category--cwe CWE-79YYY
Filter by ecosystemFilter by package ecosystem--ecosystem npm,mavenYYY
Ignore file supportSuppress findings via .stellaignoreCreate .stellaignore fileYYY
Ignore by CVEIgnore specific CVEsAdd to .stellaignoreYYY
Ignore by packageIgnore specific packagesAdd to .stellaignoreYYY
Ignore with expirationTime-limited ignoresAdd expiry in .stellaignore-YY
Ignore with justificationDocument ignore reasonsAdd reason in .stellaignoreYYY
Exit code on vulnsReturn non-zero exit code--exit-code-if-vuln 1YYY
Exit code thresholdsExit code based on severity count--exit-code-if-critical 2YYY
Fail on unknownsFail when unknowns exceed threshold--fail-on-unknowns 5%-YY

9. VEX Processing

FeatureDescriptionHow to UseFCE
OpenVEX ingestionImport OpenVEX documentsstella vex import --file vex.jsonYYY
CycloneDX VEX ingestionImport CycloneDX VEX documentsstella vex import --file cdx-vex.jsonYYY
CSAF ingestionImport CSAF advisoriesstella vex import --file csaf.jsonYYY
VEX auto-detectionDetect VEX format automaticallyAutomatic on importYYY
VEX validationValidate VEX document structureAutomatic on importYYY
VEX status: not_affectedApply not_affected statusSuppresses findingYYY
VEX status: affectedApply affected statusSurfaces findingYYY
VEX status: fixedApply fixed statusAdds fix contextYYY
VEX status: under_investigationApply investigation statusMarks as UnknownYYY
VEX justification trackingTrack VEX justificationsAutomaticYYY
VEX impact statementInclude impact statementsAutomaticYYY
VEX action statementInclude action statementsAutomaticYYY
Multi-issuer VEXIngest VEX from multiple issuersMultiple imports-YY
VEX issuer trust levelsAssign trust weights to issuersConfigure Issuer Directory-YY
VEX consensus engineCompute consensus from multiple VEXAutomatic via VexLens--Y
K4 lattice logicUse four-valued logic for consensusAutomatic--Y
VEX conflict detectionDetect conflicting VEX statementsAutomatic--Y
VEX conflict surfacingSurface conflicts in outputAutomatic--Y
Issuer DirectoryManage trusted VEX issuersConfigure in issuer-directory.yaml-YY
CSAF publisher discoveryDiscover CSAF publishersConfigure discovery--Y
VEX exportExport VEX from scan resultsstella vex export --scan <id>YYY
VEX generationGenerate VEX for findingsstella vex generate-YY

10. Reachability Analysis

FeatureDescriptionHow to UseFCE
Static reachabilityDetermine code reachability via static analysisstella scan --reachability-YY
Call graph buildingBuild call graph from entry pointsAutomatic with reachability-YY
Entry point detectionDetect application entry pointsAutomatic-YY
Reachable classificationMark vulns as REACHABLEIn scan output-YY
Unreachable classificationMark vulns as UNREACHABLEIn scan output-YY
Unknown reachabilityMark vulns with unknown reachabilityIn scan output-YY
Call path visualizationView call paths to vulnerable codestella graph show --cve <id>-YY
Call path exportExport call pathsstella graph export-YY
Binary layer analysisAnalyze compiled binaries for symbolsAutomatic--Y
Symbol presence verificationVerify vulnerable symbols existAutomatic--Y
Runtime layer analysisConfirm execution via eBPF probesConfigure runtime signals--Y
Three-layer proofsCombine static + binary + runtimeAutomatic when all available--Y
Confidence tier: ConfirmedAll three layers agreeAutomatic--Y
Confidence tier: LikelyStatic + binary agreeAutomatic--Y
Confidence tier: PresentPackage present, no path evidenceAutomatic-YY
Signed reachability graphsSign reachability graphs with DSSEConfigure in attestor.yaml--Y
Edge-bundle attestationSign individual path edgesConfigure in attestor.yaml--Y
Reachability proof exportExport reachability proofsstella graph export --proof--Y

11. Secrets Detection

FeatureDescriptionHow to UseFCE
Credential leak detectionScan for accidentally committed secretsstella scan --secretsComingComingComing
AWS access key detectionDetect AWS access keysAutomatic with secrets scanComingComingComing
AWS secret key detectionDetect AWS secret access keysAutomaticComingComingComing
GitHub token detectionDetect GitHub personal access tokensAutomaticComingComingComing
GitLab token detectionDetect GitLab tokensAutomaticComingComingComing
Private key detectionDetect private keys (RSA, EC, etc.)AutomaticComingComingComing
Database credential detectionDetect database connection stringsAutomaticComingComingComing
API key detectionDetect common API keysAutomaticComingComingComing
JWT secret detectionDetect JWT signing secretsAutomaticComingComingComing
Generic high-entropy stringsDetect high-entropy secretsAutomaticComingComingComing
Rule bundle managementManage detection rule bundlesstella secrets bundleComingComingComing
Built-in rule bundlesUse shipped rule bundlesAutomaticComingComingComing
Custom rule bundlesCreate custom rule bundlesstella secrets bundle createComing-Coming
Rule bundle signingSign rule bundlesstella secrets bundle create --signComing-Coming
Rule bundle verificationVerify rule bundle integritystella secrets bundle verifyComingComingComing
Masked outputMask detected secrets in outputAutomaticComingComingComing
Secret location reportingReport file and line of secretsIn scan outputComingComingComing
Secrets in policyUse secrets findings in policy rulessecret.hasFinding() predicateComing-Coming
Secrets severity levelsAssign severity to secret typesIn rule definitionsComingComingComing
Secrets confidence levelsAssign confidence to detectionsIn rule definitionsComingComingComing

12. Policy Engine

FeatureDescriptionHow to UseFCE
Policy pack supportDefine policies as reusable packsCreate policy YAML filesYYY
Starter-day1 packProduction-ready starter policystella policy install starter-day1YYY
Custom policy creationCreate custom policy packsWrite policy YAMLYYY
Policy validationValidate policy syntaxstella policy validate --path policy.yamlYYY
Severity-based rulesBlock/warn based on severityDefine severity rulesYYY
Reachability-based rulesBlock/warn based on reachabilityDefine reachability rules-YY
VEX-based rulesAllow VEX-suppressed findingsDefine VEX bypass rulesYYY
CVSS-based rulesRules based on CVSS scoresDefine CVSS threshold rulesYYY
EPSS-based rulesRules based on EPSS scoresDefine EPSS threshold rules-YY
KEV-based rulesBlock KEV vulnerabilitiesDefine KEV rulesYYY
Package-based rulesRules for specific packagesDefine package rulesYYY
Ecosystem-based rulesRules for specific ecosystemsDefine ecosystem rulesYYY
Age-based rulesRules based on CVE ageDefine age threshold rules-YY
Fix-available rulesRules requiring fixes to existDefine fix-required rulesYYY
Unknowns budgetFail when unknowns exceed thresholdunknownsBudget: 5%-YY
Policy simulationTest policy against historical scansstella policy simulate-YY
Policy diffCompare two policy outcomesstella policy simulate --diff-YY
Policy dry-runPreview policy effects--dry-run flag-YY
Policy push to OCIPush policies to OCI registrystella policy push --to registry/policy:v1-YY
Policy pull from OCIPull policies from OCI registrystella policy pull --from registry/policy:v1-YY
Policy list packsList available policy packsstella policy list-packsYYY
Policy export bundleExport policy for offline usestella policy export-bundle--Y
Policy import bundleImport offline policy bundlestella policy import-bundle--Y
Policy inheritanceInherit from base policiesDefine extends in policy-YY
Policy overridesOverride inherited rulesDefine overrides-YY
Environment-specific policiesDifferent policies per environmentDefine env-specific rules-YY

13. Policy Gates

FeatureDescriptionHow to UseFCE
Quality gateBlock/warn based on thresholdsConfigure quality gate rulesYYY
Approval gateRequire human approvalConfigure approval workflows--Y
Exception gateManage temporary exceptionsRequest exceptions via UI/API--Y
Exception expirationAuto-expire exceptionsSet expiration in exception--Y
Exception justificationRequire justification for exceptionsMandatory field--Y
Exception approval routingRoute to appropriate approversConfigure routing templates--Y
Stability dampingPrevent gate flickeringConfigure StabilityDampingGate--Y
Progressive rolloutGradual policy enforcementConfigure rollout percentage--Y
Gate bypass for emergenciesEmergency bypass mechanismRequires elevated permissions--Y
Gate audit trailLog all gate decisionsAutomatic-YY

14. Risk Scoring

FeatureDescriptionHow to UseFCE
CVSS 4.0 base scoringCalculate CVSS 4.0 base scoresAutomaticYYY
CVSS environmental scoringApply environmental metricsConfigure CVSS policy-YY
Custom risk scoringDefine custom scoring formulasConfigure in policy--Y
Risk budget definitionDefine acceptable risk levelsConfigure risk budgets--Y
Risk budget trackingTrack budget consumptionView in UI/API--Y
Risk budget alertsAlert on budget thresholdsConfigure alert thresholds--Y
Unknowns trackingTrack unidentified componentsstella unknowns list-YY
Unknowns classificationClassify as Hot/Warm/Cold/ResolvedAutomatic--Y
Unknowns decay trackingTrack uncertainty over timeAutomatic--Y
Unknowns blast radiusEstimate impact of unknownsIn analysis output--Y
Portfolio risk viewAggregate risk across imagesVia UI dashboard--Y
Risk trendsView risk trends over timeVia UI dashboard--Y

15. Comparison & Diff

FeatureDescriptionHow to UseFCE
SBOM comparisonCompare two SBOMsstella compare sbom --a v1.json --b v2.jsonYYY
Package diffShow added/removed packagesIn comparison outputYYY
Version diffShow version changesIn comparison outputYYY
License diffShow license changesIn comparison outputYYY
Vulnerability diffShow vuln changes between scansstella compare scan --a <id1> --b <id2>YYY
New vulnerabilitiesShow newly introduced vulnsIn comparison outputYYY
Fixed vulnerabilitiesShow fixed/removed vulnsIn comparison outputYYY
Semantic risk deltaCompare security meaning, not countsstella compare risk--Y
Reachability driftDetect reachability changesstella drift reachability--Y
Policy outcome diffCompare policy decisionsstella policy simulate --diff-YY
Smart-Diff summary“Exploitability dropped 40%” styleIn comparison output--Y

16. Deterministic Replay

FeatureDescriptionHow to UseFCE
Scan Replay Manifest (SRM)Generate manifest for replaystella scan --srm-out manifest.yaml--Y
Replay scan from manifestReplay using SRMstella replay --manifest manifest.yaml--Y
Replay digest assertionVerify replay matches originalstella replay --assert-digest sha256:...--Y
Knowledge snapshot exportExport frozen knowledge statestella airgap export --output snapshot.tar.gz--Y
Knowledge snapshot importImport knowledge snapshotstella airgap import snapshot.tar.gz--Y
Knowledge snapshot diffCompare two snapshotsstella airgap diff --base a.tar.gz --target b.tar.gz--Y
Staleness trackingTrack snapshot agestella airgap status--Y
Staleness warningsWarn when snapshot is agingAutomatic--Y
Staleness blockingBlock when snapshot too oldConfigure staleAction: block--Y
Verdict replayReplay policy decisionsstella replay snapshot --verdict <id>--Y
Replay verificationVerify replay produces same resultAutomatic with assertion--Y
Feed snapshot inclusionInclude feed snapshots in replayAutomatic--Y
Analyzer version pinningPin analyzer versions for replayIn SRM--Y
Policy version pinningPin policy version for replayIn SRM--Y

17. Attestation & Signing

FeatureDescriptionHow to UseFCE
DSSE attestation formatUse DSSE envelope formatAutomatic-YY
in-toto attestationGenerate in-toto attestationsConfigure Attestor-YY
SBOM attestationSign SBOMs with attestationstella attest sbom-YY
Scan result attestationSign scan resultsstella attest scan-YY
Verdict attestationSign policy verdictsstella attest verdict--Y
Evidence bundle creationCreate signed evidence bundlesstella evidence bundle--Y
Keyless signingSign using OIDC identity (Sigstore)stella sign keyless --input file-YY
Rekor transparency logUpload to Rekorstella sign keyless --rekor-YY
Keyless verificationVerify keyless signaturesstella sign verify-keyless-YY
Self-hosted FulcioUse self-hosted FulcioConfigure --fulcio-url--Y
Self-hosted RekorUse self-hosted RekorConfigure --rekor-url--Y
Traditional key signingSign with managed keysstella sign --key-id <id>-YY
Key rotation supportRotate signing keysVia key management--Y
Multi-signature supportSign with multiple keysConfigure multiple signers--Y
Signature verificationVerify signaturesstella verify signature-YY
Attestation verificationVerify attestationsstella verify attestation-YY

18. Cryptography Profiles

FeatureDescriptionHow to UseFCE
Default crypto profileStandard cryptographic algorithmsDefaultYYY
FIPS-140-3 profileUS federal crypto requirementsConfigure profile: fips-140-3--Y
eIDAS profileEU qualified signaturesConfigure profile: eidas--Y
GOST-2012 profileRussian Federation requirementsConfigure profile: gost-2012--Y
SM2 profilePRC cryptographic requirementsConfigure profile: sm2--Y
Post-quantum profileDilithium, Falcon algorithmsConfigure profile: pqc--Y
Algorithm selectionChoose specific algorithmsConfigure algorithms section--Y
Multi-profile signingSign with multiple profilesConfigure multiple profiles--Y
Profile validationValidate crypto configurationAutomatic on startup--Y
Hardware security moduleHSM integrationConfigure HSM provider--Y

19. Offline & Air-Gap

FeatureDescriptionHow to UseFCE
Offline Update Kit exportExport complete offline bundlestella airgap export --output kit.tar.gz--Y
Offline Update Kit importImport offline bundlestella airgap import kit.tar.gz--Y
Kit signature verificationVerify kit signatures on importAutomatic or --verify-only--Y
Kit Merkle root verificationVerify kit integrity via Merkle rootAutomatic--Y
Advisory feed inclusionInclude advisory feeds in kit--include-advisories--Y
VEX document inclusionInclude VEX statements in kit--include-vex--Y
Policy bundle inclusionInclude policy bundles in kit--include-policies--Y
Trust root inclusionInclude trust roots in kitAutomatic--Y
Staleness policy configurationConfigure max bundle ageConfigure in airgap.yaml--Y
Staleness warning thresholdWarn when bundle agesConfigure warnAgeHours--Y
Staleness block thresholdBlock when bundle too oldConfigure maxAgeHours--Y
Version monotonicityPrevent rollback attacksenforceMonotonicity: true--Y
Feed mirror serviceMirror advisory feeds locallyDeploy Mirror service--Y
Registry mirror supportUse registry mirrorsConfigure mirrors in scanner.yaml-YY
Transparency log mirrorMirror Rekor transparency logDeploy Rekor mirror--Y
Egress allowlist modeOnly allow specified hostsConfigure egressPolicy.mode: allowlist--Y
Egress denylist modeBlock specified hostsConfigure egressPolicy.mode: denylist--Y
Sealed modeBlock all network accessConfigure sealed mode--Y
Localhost-only modeAllow only localhost trafficConfigure allowLocalhost: true--Y
Time anchor (Roughtime)Secure time from Roughtime serversConfigure Roughtime servers--Y
Time anchor (RFC 3161)Secure time from TSA serversConfigure TSA servers--Y

20. Verification

FeatureDescriptionHow to UseFCE
Offline evidence verificationVerify evidence without networkstella verify offline --evidence-dir ./evidence--Y
Image attestation verificationVerify image has required attestationsstella verify image registry/app@sha256:...-YY
Require SBOM attestationRequire SBOM attestation--require sbom-YY
Require VEX attestationRequire VEX attestation--require vex-YY
Require decision attestationRequire policy decision attestation--require decision--Y
Require approval attestationRequire approval attestation--require approval--Y
Strict modeFail if any attestation missing--strict-YY
Evidence bundle verificationVerify complete evidence bundlestella verify bundle --bundle ./bundle--Y
Skip replay verificationVerify only input hashes--skip-replay--Y
Trust policy applicationApply trust policy during verification--trust-policy policy.yaml--Y
Certificate verificationVerify signing certificatesAutomatic-YY
Certificate chain validationValidate full certificate chainAutomatic-YY
OCSP checkingCheck certificate revocationAutomatic when online-YY
CRL checkingCheck certificate revocation listsAutomatic-YY
Offline revocation checkingCheck revocation without networkUsing embedded CRLs--Y

21. Authentication

FeatureDescriptionHow to UseFCE
OAuth 2.0 authorization codeAuthorization code flow for usersConfigure Authority-YY
OAuth 2.0 client credentialsClient credentials for servicesConfigure Authority-YY
OAuth 2.0 refresh tokensRefresh token supportConfigure Authority-YY
OpenID ConnectOIDC authenticationConfigure Authority-YY
DPoP (Proof of Possession)Bind tokens to client keysConfigure senderConstraint: dpop--Y
mTLS authenticationMutual TLS for service authConfigure mTLS--Y
API key authenticationSimple API key authConfigure API keysYYY
Token lifetime configurationConfigure token expirationConfigure in authority.yaml-YY
Token refresh configurationConfigure refresh token lifetimeConfigure in authority.yaml-YY
LDAP integrationAuthenticate via LDAPDeploy LDAP plugin--Y
SAML integrationAuthenticate via SAMLDeploy SAML plugin--Y
External IdP integrationUse external identity providerConfigure OIDC provider-YY
MFA requirementRequire multi-factor authConfigure in Authority--Y
Session managementManage user sessionsVia Authority-YY
Token revocationRevoke access tokensVia Authority API-YY

22. Authorization & Access Control

FeatureDescriptionHow to UseFCE
Role-based access controlAssign roles to usersConfigure in Authority-YY
policy-author roleCreate and edit policiesAssign role-YY
policy-reviewer roleReview policy changesAssign role-YY
policy-approver roleApprove policies for productionAssign role--Y
policy-operator roleRun and activate policiesAssign role-YY
policy-auditor roleAudit policy decisionsAssign role--Y
airgap-viewer roleView offline kit statusAssign role--Y
airgap-operator roleImport/export offline kitsAssign role--Y
airgap-admin roleFull air-gap administrationAssign role--Y
vuln-viewer roleView vulnerability findingsAssign role-YY
vuln-investigator roleInvestigate and triage findingsAssign role-YY
vuln-operator roleTake action on findingsAssign role-YY
vuln-auditor roleAudit vulnerability decisionsAssign role--Y
export-viewer roleView export resultsAssign role-YY
export-operator roleTrigger exportsAssign role-YY
export-admin roleManage export configurationAssign role--Y
notify-viewer roleView notificationsAssign role-YY
notify-operator roleManage notificationsAssign role-YY
notify-admin roleFull notification adminAssign role--Y
Custom rolesDefine custom rolesConfigure in Authority--Y
Attribute-based accessFine-grained ABACConfigure attributes--Y
Environment restrictionsRestrict access by environmentConfigure env attributes--Y
Business tier restrictionsRestrict by business tierConfigure tier attributes--Y
Service accountsCreate service identitiesConfigure in Authority-YY
Delegated tokensIssue delegated access tokensVia Authority API--Y
Scope-based permissionsPermission scopes on tokensConfigure scopes-YY

23. Evidence Management

FeatureDescriptionHow to UseFCE
Evidence LockerStore tamper-evident evidenceVia EvidenceLocker API--Y
Evidence sealingSeal evidence with hashesAutomatic--Y
Evidence retrievalRetrieve stored evidenceVia EvidenceLocker API--Y
Legal holdApply legal hold to evidenceVia UI/API--Y
Legal hold overridePrevent deletion during holdAutomatic--Y
Retention policiesConfigure retention periodsConfigure policies--Y
Per-type retentionDifferent retention by typeConfigure policies--Y
Evidence exportExport evidence bundlesVia ExportCenter--Y
Evidence chain verificationVerify evidence chain integrityVia verification APIs--Y

24. Observability

FeatureDescriptionHow to UseFCE
Structured JSON loggingJSON formatted log outputConfigure loggingYYY
Log level configurationSet minimum log levelConfigure minimumLogLevelYYY
Console log outputLog to consoleexportConsole: trueYYY
OpenTelemetry tracingDistributed tracingConfigure enableTracing: true-YY
OpenTelemetry metricsPrometheus-compatible metricsConfigure enableMetrics: true-YY
OTLP exportExport to OTLP collectorConfigure otlpEndpoint-YY
Custom resource attributesAdd custom trace attributesConfigure resourceAttributes-YY
Service name configurationSet service name for tracesConfigure serviceName-YY
Timeline event indexingIndex security eventsAutomatic via TimelineIndexer--Y
Timeline queriesQuery event historyVia Timeline API--Y
Audit trailComplete action audit logAutomatic-YY
Audit log exportExport audit logsVia API--Y
Incident bridgeBridge to incident managementConfigure Incident Bridge--Y
Health checksService health endpoints/health endpointYYY
Readiness probesKubernetes readiness/ready endpointYYY
Liveness probesKubernetes liveness/live endpointYYY

25. Notifications

FeatureDescriptionHow to UseFCE
Slack notificationsSend to Slack webhooksConfigure Slack webhook-YY
Microsoft Teams notificationsSend to Teams webhooksConfigure Teams webhook-YY
Email notificationsSend via SMTPConfigure SMTP settings-YY
PagerDuty integrationCreate PagerDuty incidentsConfigure PagerDuty--Y
Generic webhooksSend to custom webhooksConfigure webhook URL-YY
Notification templatesCustomize notification contentConfigure templates-YY
Severity-based routingRoute by severity levelConfigure routing rules-YY
Notification escalationEscalate unacknowledged alertsConfigure escalation--Y
Notification acknowledgmentAcknowledge notificationsVia Notify API-YY
Notification mutingTemporarily mute notificationsConfigure mute windows-YY
Notification rate limitingLimit notification frequencyConfigure rate limits-YY

26. CI/CD Integration

FeatureDescriptionHow to UseFCE
Exit code controlReturn codes for CI/CD--exit-code-if-vuln 1YYY
GitHub Actions templateGenerate GitHub Actions workflowstella ci generate --platform githubYYY
GitLab CI templateGenerate GitLab CI pipelinestella ci generate --platform gitlabYYY
Azure Pipelines templateGenerate Azure Pipelinesstella ci generate --platform azureYYY
Jenkins templateGenerate Jenkinsfilestella ci generate --platform jenkinsYYY
SARIF for GitHubUpload SARIF to GitHub Security--output sarifYYY
SARIF for GitLabUpload SARIF to GitLab Security--output sarifYYY
PR commentsComment scan results on PRsConfigure CI integration-YY
MR commentsComment scan results on GitLab MRsConfigure CI integration-YY
PR evidence annotationsInclude attestation digest, policy verdict, and verify command in PR comments--pr-comment --evidence-link-YY
ASCII-only annotation outputDeterministic PR/MR comments without Unicode glyphsDefault behavior-YY
Status checksUpdate PR status checksConfigure CI integration-YY
Merge blockingBlock merge on policy failureConfigure CI integration-YY

27. Registry Integration

FeatureDescriptionHow to UseFCE
Docker HubPull from Docker HubDefaultYYY
GitHub Container RegistryPull from GHCRAuthenticate with tokenYYY
AWS ECRPull from Amazon ECRConfigure ECR credentialsYYY
Google GCRPull from Google Container RegistryConfigure GCP credentialsYYY
Azure ACRPull from Azure Container RegistryConfigure Azure credentialsYYY
HarborPull from Harbor registryConfigure credentialsYYY
JFrog ArtifactoryPull from ArtifactoryConfigure credentialsYYY
Quay.ioPull from QuayConfigure credentialsYYY
Private registriesPull from any private registryConfigure credentialsYYY
Registry webhook (push)Scan on image pushConfigure Zastava webhook-YY
Admission controllerBlock deployment on failureDeploy admission webhook--Y
Image signing verificationVerify image signaturesConfigure signature policy--Y

28. Deployment Options

FeatureDescriptionHow to UseFCE
Docker ComposeSingle-node deploymentdocker compose upYYY
Kubernetes deploymentDeploy on KubernetesUse Helm charts-YY
Helm chartsHelm-based deploymenthelm install stellaops-YY
Air-gapped deploymentFully offline deploymentUse Offline Kit--Y
Multi-tenant deploymentIsolated tenantsConfigure multi-tenancy--Y
High availabilityHA deployment patternsConfigure replication--Y
Horizontal scalingScale workers horizontallyConfigure replicas--Y
Auto-scalingKubernetes HPA integrationConfigure HPA--Y

29. Storage & Infrastructure

FeatureDescriptionHow to UseFCE
PostgreSQL 16+Primary data storageConfigure connection stringYYY
PostgreSQL connection poolingConnection pool managementConfigure pool settingsYYY
PostgreSQL read replicasScale read operationsConfigure replicas--Y
Valkey/Redis cachingCache layerConfigure Valkey/Redis-YY
Rate limitingAPI rate limitingConfigure rate limits-YY
Queue managementJob queue managementVia Scheduler-YY
Queue shardingDistribute queue loadConfigure sharding--Y
Blob storageStore large artifactsConfigure blob storage-YY
S3-compatible storageUse S3-compatible storageConfigure S3 endpoint-YY

30. Web UI Features

FeatureDescriptionHow to UseFCE
DashboardOverview dashboardAccess via browser-YY
Scan results viewView scan findingsNavigate to scans-YY
Vulnerability detailsDetailed vuln informationClick on vulnerability-YY
SBOM viewerView SBOM contentsNavigate to SBOMs-YY
Policy editorEdit policies in UINavigate to policies-YY
Policy simulation UISimulate policies in UIUse simulation panel-YY
Exception management UIManage exceptionsNavigate to exceptions--Y
Approval workflows UIApprove in UINavigate to approvals--Y
Timeline viewView event timelineNavigate to timeline--Y
Triage canvasVisual triage interfaceNavigate to triage--Y
Noise gating UIManage noise gatingNavigate to noise gating--Y
Risk dashboardPortfolio risk viewNavigate to risk--Y
Export center UIConfigure exportsNavigate to exports-YY
Notification settingsConfigure notificationsNavigate to settings-YY
User managementManage usersNavigate to admin--Y
Tenant managementManage tenantsNavigate to admin--Y
Audit log viewerView audit logsNavigate to audit--Y

Feature Count Summary

CategoryTotal FeaturesFreeCommunityEnterprise
Container Scanning14101314
OS Package Detection16161616
Language Ecosystems29272929
Vulnerability Sources17141617
Vulnerability Enrichment18151718
SBOM Capabilities17121517
Output Formats16121416
Filtering16141616
VEX Processing22121722
Reachability170917
Secrets Detection200020 (Coming)
Policy Engine23111923
Policy Gates102310
Risk Scoring122512
Comparison & Diff116811
Deterministic Replay140014
Attestation & Signing1701017
Cryptography Profiles101110
Offline & Air-Gap200220
Verification150815
Authentication1521015
Authorization2601326
Evidence Management9009
Observability1661216
Notifications110811
CI/CD Integration1081010
Registry Integration12101112
Deployment8248
Storage & Infrastructure9369
Web UI1701017
TOTAL483181292483

Last updated: 2026-01-04