The Full Scan Surface
Everything we have been building the scan engine toward shipped this week. Secret scanning, SAST, container scanning, SBOM, exploit enrichment, exploit chains, supply chain analysis, API surface analysis, policy compliance, AI slop detection, database findings, code quality, and business logic analysis all landed with findings, enrichment, Captain Patch suggestions, and issue linkage. The merge gate is real.
Scan Infrastructure
Before any findings, the foundation got stronger.
| What Shipped | What It Does |
|---|---|
| Agent pipeline tables | Every agent's output is tracked, counted, and attributed |
| Performance tracking | Runtime metrics are captured per agent, not just per scan |
| Runtime preflight checks | Agents verify the environment before executing, not midway through |
strace runtime tracking | Runtime behavior is observed and stored alongside static findings |
| PostgreSQL support | Scan infrastructure now runs cleanly on PostgreSQL |
Install command detection and per-scope preflight checks also shipped. Scans are more reliable and more debuggable than they were a week ago.
SBOM and File Risk History
autter now generates and stores Software Bill of Materials artifacts scoped to each organization. CycloneDX URL support is in. License and SBOM normalization is cleaner. File risk history now traces back through commit history, so you can see how a file's risk profile has changed over time, not just what it looks like today.
AI-Generated Scan Summaries
Scan results now include a human-readable summary generated by AI. The overview experience is cleaner, and the summary gives teams a starting point for triage instead of a raw list of findings.
Issue Sync: Linear, Jira, and GitHub
autter shipped multi-provider issue connector infrastructure this week. Linear, Jira, and GitHub Issues are all supported.
| What Shipped | What It Does |
|---|---|
| Bidirectional sync | Issues created in autter stay in sync with your issue tracker |
| External issue creation | Push a finding to your tracker directly from autter |
| Sync logs | Every sync event is recorded and auditable |
| Backfill support | Historical findings can be synced, not just new ones |
| Persistent scan action items | Action items from scans persist and can be promoted to tracked issues |
The issue side sheet also got a full rebuild: selected issue cards, properties, activity, comments, and Captain Patch suggestions live in a single panel. Suggestions now have an accept or decline workflow, so triage is a decision, not a manual copy-paste.
Captain Patch Analysis
Captain Patch suggestions are now persisted. Analysis runs, writes to the database, and surfaces in the UI consistently across sessions. Captain Patch is no longer ephemeral.
Secret Scanning
Secret scanning shipped with live validation, allowlists, rotation mapping, and direct issue creation from findings. Detected secrets are not just flagged: they are enriched with rotation guidance and tracked as actionable items.
SAST and CodeQL
SAST findings now include enrichment, validation, and suggestions. CodeQL is live as a fourth scanning engine alongside the existing three. Four independent engines against your codebase means significantly fewer gaps in static analysis coverage.
Dependency Auditing
Dependency findings are unified across engines and linked directly to issues. The view is cohesive instead of fragmented across different audit sources.
License Findings
License findings now route through Captain Patch for analysis, and the license detail UI is richer. Compliance risk from open source licenses surfaces with enough context to act on it.
Container Scanning
Trivy filesystem scanning is live. Container findings are analyzed by Captain Patch and surface alongside the rest of the scan results. Teams shipping containers now have the same finding depth as teams shipping only application code.
Exploit Enrichment and Chain Tracing
Vulnerability findings got substantially deeper.
| What Shipped | What It Means |
|---|---|
| EPSS scoring | Exploit probability is attached to each CVE |
| CVSS integration | Severity is standardized, not estimated |
| OSV enrichment | Open Source Vulnerabilities database data feeds into findings |
| Exa context | External intelligence enriches findings with real-world exploit context |
| Complexity scoring | Findings are ranked by how hard they are to exploit |
| Exploit chain tracing | Connected vulnerability paths are tracked as chains, not isolated findings |
Exploit chain findings are persisted, exposed through API endpoints, and visualized with path views and detail panels.
API Surface Analysis
API surface analysis now includes endpoint validation, authentication checks, filters, detail sheets, and Captain Patch suggestions. The API risk view is actionable in a way the previous version was not.
Supply Chain Analysis
Socket.dev integration is live. False-positive marking is in. Supply chain findings are enriched with real package intelligence, not just version matching.
Policy Compliance
Policy rules can now be validated directly against scan findings. Violations are tracked and linked to issues. Compliance is enforceable, not advisory.
AI Slop Detection
autter now detects AI-generated code patterns that signal quality problems: hallucinated imports, placeholder logic, and low-confidence outputs that made it past review. Findings go through validation, with filters, modals, and Captain Patch suggestions attached.
Database, Code Quality, and Business Logic
Database analyst findings now support dismissal and on-demand Captain Patch analysis. Code quality findings are enriched and can be raised directly to suggestions. Business logic analysis shipped attack scenario documentation, race-condition deduplication, and an expanded findings surface.
A merge gate is only as strong as what it checks. This week we finished building the checklist.
