JSPM

  • ESM via JSPM
  • ES Module Entrypoint
  • Export Map
  • Keywords
  • License
  • Repository URL
  • TypeScript Types
  • README
  • Created
  • Published
  • Downloads 24
  • Score
    100M100P100Q82961F
  • License Apache-2.0

AI Agent Governance Scanner — test whether your agents are governed before deployment

Package Exports

  • @raknor/aegis
  • @raknor/aegis/src/cli-governance.js

This package does not declare an exports field, so the exports above have been automatically detected and optimized by JSPM instead. If any package subpath is missing, it is recommended to post an issue to the original package (@raknor/aegis) to support the "exports" field. If that is not possible, create a JSPM override to customize the exports field for this package.

Readme

AEGIS — Autonomous Equilateral Governed Intelligence System

A governed Cyber Reasoning System that discovers vulnerabilities across 7 languages, proves exploitability, synthesizes patches (including LLM-assisted), and deploys fixes — all under consequence-tier governance with cryptographic provenance.

Pareidolia LLC (d/b/a Equilateral AI)

AEGIS — The Autonomous & Governed Cyber Reasoning Lifecycle

What It Does

Every step produces a hash-chained provenance entry. T3+ actions require human approval. The pipeline halts — not fails — when governance intervenes.

Supported Languages

Language Extensions CWE Coverage
C/C++ .c, .cpp, .h, .hpp, .cc 120, 121, 122, 134, 190, 476, 416, 415, 78, 89
Python .py 78, 89, 94, 502, 22, 79
Java .java 78, 89, 502, 22, 79, 611, 90
JavaScript .js, .mjs, .cjs 78, 94, 89, 79, 22, 502, 918, 327, 1321
TypeScript .ts, .mts, .tsx, .jsx same as JS + type-aware
Go .go 78, 89, 22, 295, 327, 676

Plus: CWE-798 (hardcoded secrets), CWE-1035 (dependency vulnerabilities)

Quick Start

# Install
npm install

# Initialize config
npx aegis init

# Scan a project (Phase 1: Recon → Furies → Triage)
npx aegis run ./your-project --phase1 --no-db

# Full scan with reports
npx aegis run ./your-project --no-db --sarif --html --scan-deps --scan-secrets

# CI/CD mode (exit 1 on critical findings)
npx aegis run . --phase1 --no-db --fail-on=critical --json

# Watch mode (re-scan on file changes)
npx aegis watch ./your-project

# Start API server with dashboard
npx aegis serve --port=3000

Docker

docker build -t aegis .
docker run -v $(pwd):/target aegis run /target --phase1 --sarif
docker run -p 3000:3000 aegis serve --port=3000

CLI Reference

Commands

Command Description
run <target> Run CRS pipeline against a target directory
watch <target> Watch for changes and re-scan automatically
serve Start REST API server with dashboard
init Create .aegisrc.json and .aegis-suppress.json
status Show system status and database stats
verify <run-id> Verify provenance chain integrity
help Show help message

Options

Pipeline:
  --phase1               Recon → Furies → Triage only
  --no-db                Run without database (in-memory)
  --no-tree-sitter       Use regex fallback instead of AST

Reports:
  --sarif                SARIF 2.1.0 report
  --html                 HTML vulnerability report
  --json                 Machine-readable JSON to stdout
  --git-patches=DIR      Git-format .patch files
  --fuzz-harnesses=DIR   LibFuzzer harness files

Scanning:
  --scan-deps            npm audit / pip audit
  --scan-secrets         Detect hardcoded secrets

CI/CD:
  --fail-on=SEVERITY     Exit 1 on critical|high|medium|low
  --max-findings=N       Exit 1 if count exceeds N
  --github-pr=NUMBER     Post PR review comments
  --github-check         Create GitHub check run

Baselines:
  --save-baseline=PATH   Save findings as baseline
  --baseline=PATH        Compare against baseline

Filtering:
  --suppress-file=PATH   Load suppression rules
  --since=REF            Incremental scan (git diff)

GitHub Actions

# .github/workflows/aegis.yml
name: AEGIS Scan
on: [push, pull_request]
jobs:
  scan:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4
      - uses: JamesFord-HappyHippo/AEGIS@main
        with:
          target: '.'
          fail-on: 'critical'
          scan-deps: 'true'
          scan-secrets: 'true'

Configuration

.aegisrc.json

{
  "phase1": true,
  "sarif": true,
  "html": true,
  "failOn": "critical",
  "suppressFile": ".aegis-suppress.json"
}

.aegis-suppress.json

{
  "suppressions": [
    { "crashHash": "abc123", "reason": "False positive" },
    { "cweId": "CWE-78", "filePath": "scripts/", "reason": "Intentional" },
    { "filePath": "test/", "reason": "Test code" }
  ]
}

Architecture

9 Pipeline Agents

Agent Codename Tier Role
Recon Athena's Owl T1 AST parsing, call graph, attack surface mapping
Alecto The Relentless T2 Memory safety (buffer overflow, UAF, double-free)
Megaera The Grudging T2 Taint flow (source→sink, inter-procedural via call graph)
Tisiphone The Avenger T2 Logic bugs (null deref, integer overflow, UAF)
Triage The Oracle T1 Dedup, CVSS v3.1 scoring, severity classification
Exploit Proof Prometheus T3 PoC generation + sandbox validation (ASan)
Synthesis Hephaestus T3 Patch generation (template + Claude API LLM)
Verification Themis T2 Sandbox compilation + heuristic verification
Deployment Hermes T4 Patch application, unified diffs, rollback plans

Governance

  • ConsequenceTierGate — T1 auto-pass, T2 logged, T3-T4 hold for approval
  • IntentCapsuleManager — HMAC-signed mandates with drift detection
  • EarnedAuthorityEngine — Agents earn autonomy through track record
  • ProvenanceStore — SHA-256 hash-chained, append-only, SLSA-compatible

Additional Scanners

  • DependencyScanner — npm audit integration, CWE-1035
  • SecretDetector — 16 patterns (AWS, GitHub, Slack, JWT, private keys, API keys)

Reports & Integrations

  • SARIF 2.1.0 — GitHub code scanning compatible
  • HTML — Self-contained dark-theme report with CVSS scores
  • JSON — Machine-readable CI/CD summary
  • REST APIPOST /api/scan, GET /api/findings, dashboard at /
  • GitHub — PR comments, check runs, SARIF upload

Testing

# Run all 292 tests
npm test

# Self-scan AEGIS
npm run self-scan

npm Scripts

Script Description
npm run scan Quick Phase 1 scan of current directory
npm run scan:ci CI-optimized scan with SARIF + JSON + gates
npm run serve Start API server
npm run watch Watch mode
npm run self-scan Scan AEGIS's own code
npm test Run test suite

License

UNLICENSED — Proprietary. Pareidolia LLC (d/b/a Equilateral AI).