Static analysis
Call graph extraction from bytecode and source. Traces execution paths to vulnerable functions.
Evidence Engine
Generate SBOMs, analyze hybrid reachability, and produce signed evidence for every artifact.
Meaningful reduction in false positives through three-layer analysis
Traditional scanners tell you a CVE exists. Stella proves whether your code actually calls the vulnerable function.
Call graph extraction from bytecode and source. Traces execution paths to vulnerable functions.
Import statements, dependency trees, package manifests. Identifies which code is actually included.
Optional profiling data for higher confidence. Proves what code paths are actually executed. eBPFExtended Berkeley Packet Filter — a Linux kernel technology that runs sandboxed programs for high-performance observability and runtime analysis without kernel modules
Result: Significantly fewer false positives
Focus on reachable CVEs instead of hundreds of theoretical ones.
$ trivy image myapp:latest
Total: 487 vulnerabilities
CRITICAL: 23
HIGH: 89
MEDIUM: 241
LOW: 134
"Great. Which ones actually matter?" $ stella scan myapp:latest --reachability
Total: 487 CVEs detected
Reachable: 12 CVEs
CRITICAL: 2 (both in auth path)
HIGH: 4 (3 in API handler)
MEDIUM: 6
Focus on what matters. Ship with confidence. Generate, ingest, and diff SBOMs with full version history and lineage tracking.
CycloneDX 1.7, SPDX 3.0, Trivy-JSON with auto-detection.
Sub-second warm-path scans through intelligent caching.
Full versioned history with traversal queries.
Per-layer SBOM extraction and base image detection.
Material change detection between releases.
Ingest external SBOMs and add reachability analysis.
Plus OS package analyzers for apk, apt, yum, dnf, rpm, and pacman.
Aggregate vulnerability intelligence from global, vendor, and regional sources with automatic sync and conflict detection.
NVDNational Vulnerability Database - the U.S. government repository of standards-based vulnerability data (NIST), CVECommon Vulnerabilities and Exposures - a unique identifier for a publicly known security vulnerability (MITRE), OSVOpen Source Vulnerabilities - a distributed vulnerability database for open source projects, GHSAGitHub Security Advisories - security vulnerability database for packages on GitHubCISACybersecurity and Infrastructure Security Agency - U.S. federal agency responsible for cybersecurity guidance and vulnerability catalogs KEVKnown Exploited Vulnerabilities - CISA's catalog of vulnerabilities actively exploited in the wild, EPSSExploit Prediction Scoring System - a probability score (0-100%) predicting how likely a vulnerability is to be exploited in the wild v4JVNJapan Vulnerability Notes - Japan's vulnerability database managed by JPCERT/CC and IPAAll sources deduplicated with signed snapshots for deterministic replay
<1s
Delta-SBOM caching for repeated digests
70-90%
Through hybrid reachability analysis
33+
Aggregated with automatic sync
Every scan produces signed, exportable evidence.
SBOMSoftware Bill of Materials - a complete list of all packages and dependencies in your software snapshot (CycloneDXAn open standard format for software bill of materials (SBOM) used across the industry/SPDXSoftware Package Data Exchange - another open standard format for SBOMs, widely used in open source)ReachabilityAnalysis that proves whether vulnerable code is actually called by your application — filtering out false positives from scanner noise graph with edge attestationsDSSEDead Simple Signing Envelope - a simple, flexible standard for signing arbitrary data with cryptographic signatures-signed evidence bundlesUse Stella's scanning and reachability as a standalone evidence producer.
SBOMSoftware Bill of Materials - a complete list of all packages and dependencies in your software + reachability for your CI pipelineCycloneDXAn open standard format for software bill of materials (SBOM) used across the industry, or Decision CapsulesAdd orchestration, policy gates, and deployment execution for end-to-end release governance.
Digest-firstRelease identity based on immutable content hashes (SHA-256 digests) rather than mutable tags — ensuring byte-identical deployments versioning across environmentsStart scanning with reachability analysis.