Features

Technical mechanisms behind defensible release decisions

Stella combines scan evidence, reachability context, VEX statements, and approval policy into one digest-first control path for non-Kubernetes releases.

  • Reachability-first triage - prioritize exploitable CVEs instead of total CVE count
  • Deterministic replay - reproduce historical verdicts with frozen inputs and matching output
  • Signed Decision Capsules - export verifiable evidence for audit and incident review

What this means for your business

Reduce reachable-CVE triage queues, keep promotion verdicts reproducible, and move audit response from narrative reconstruction to signature and replay verification.

Proof anchors

Each claim links to inspectable evidence artifacts, replay workflow, and specification docs.

Evidence and Audit | Decision Capsule spec | How it works

What you can validate in 30 minutes

Install

Docker Compose deployment

Scan

SBOM plus reachability

Promote

Dev -> Staging gate

Export

Signed Decision Capsule

Why promotion decisions are defensible

SBOM and VEX with conflict-aware consensus

Generate SPDX/CycloneDX SBOMs, ingest multi-issuer OpenVEX, and resolve conflicting assertions with deterministic K4 lattice logic. SBOMSoftware Bill of Materials - a complete list of all packages and dependencies in your software VEXVulnerability Exploitability eXchange - machine-readable statements about whether vulnerabilities are actually exploitable in your context

  • Generate SPDXSoftware Package Data Exchange - another open standard format for SBOMs, widely used in open source 3.0.1 and CycloneDXAn open standard format for software bill of materials (SBOM) used across the industry 1.7 SBOMs from container images
  • Ingest multi-issuer OpenVEXAn open standard format for VEX statements about vulnerability exploitability and resolve conflicts with deterministic K4 lattice logic
  • Match CVEs across 30+ advisory sources with fast warm-path scans
Learn more →

Reachability-backed risk decisions

Combine static call graphs, binary symbols, and runtime eBPF probes to prove which CVEs are reachable in real execution paths. ReachabilityAnalysis that proves whether vulnerable code is actually called by your application — filtering out false positives from scanner noise

  • Three-layer analysis: static call graphs, binary symbols, and runtime eBPFExtended Berkeley Packet Filter — a Linux kernel technology that runs sandboxed programs for high-performance observability and runtime analysis without kernel modules probes
  • Signed DSSEDead Simple Signing Envelope - a simple, flexible standard for signing arbitrary data with cryptographic signatures proofs that bind findings to executable paths
  • Focus on reachable CVEs instead of inflated theoretical counts
Learn more →

Digest-pinned release identity

Resolve every release to immutable OCI digests at creation time so tags remain aliases and pulls remain tamper-detectable.

  • Release identity is an immutable OCIOpen Container Initiative — the industry standard for container image formats and registries digest set fixed at creation time
  • Tags stay aliases; digests remain source of truth
  • Audit history shows exactly what ran, where, and when
Learn more →

Agentless deployment for non-Kubernetes targets

Deploy over SSH/WinRM to Linux and Windows using canary, rolling, or blue-green strategies, with rollback to known-good digests.

  • Deploy to Docker Compose, Swarm, ECS, Nomad, or scripted hosts
  • Agentless SSH (Linux) and WinRM (Windows) execution
  • Canary, rolling, and blue-green strategies with fast rollback
Learn more →

Why technical buyers choose Stella

Most tools stop at findings or deployment. Stella records the decision path and the proof.

Evidence, Not Assertions

Every promotion emits signed evidence that auditors can verify independently without vendor lock-in.

Non-Kubernetes First

Docker Compose, ECS, Nomad, and scripted hosts are first-class targets, not edge cases.

Deterministic Replay

Re-run any decision with frozen inputs and verify bit-for-bit identical output.

Sovereign & Offline

Run fully air-gapped with signed feed bundles and customer-controlled key infrastructure.

How Stella compares by architecture

Compare tools by deployment model, evidence model, and operational fit.

ToolCategoryKey Difference
Trivy / GrypeScannersStrong findings scanner; no promotion orchestration or signed decision replayCompare →
SnykSCASoftware Composition Analysis — automated scanning of third-party and open-source components for known vulnerabilities and license risks PlatformStrong SaaS security platform; limited sovereign/offline release controlCompare →
Octopus DeployCD PlatformStrong deployment automation; no built-in reachability-driven security evidence chainCompare →
GitHub ActionsCI/CDExcellent CI automation; not a dedicated release evidence control planeCompare →
HarnessCD PlatformPowerful CD platform; primarily Kubernetes-first with limited non-Kubernetes evidence modelCompare →

See full architecture comparison (15 vendors) ->

Run your first digest through Stella

Run one digest through scan, gate, promotion, and replay; measure reachable-CVE reduction, replay match, and audit packet generation time.