Open Source · Security Tool Orchestrator

Automate YourSecurity Scans

ScopeGuardian is a CLI tool that runs multiple security scanners on your codebase and synchronises findings with DefectDojo. Block your CI/CD pipeline when vulnerabilities exceed your thresholds.

ScopeGuardian
# Run a scan, sync results, and enforce the security gate
$ SCAN_DIR=/path/to/repos \
DD_URL=http://defectdojo:8080 \
DD_ACCESS_TOKEN=<your-token> \
./ScopeGuardian \
--projectName my-service \
--branch main \
--sync \
--threshold critical=1,high=5 \
./config.toml
# Output
✓ KICS scan complete — 3 findings
✓ Grype scan complete — 12 findings
✓ OpenGrep scan complete — 2 findings
✓ Synced to DefectDojo (engagement: my-service-main)
✓ Security gate passed — pipeline continues
Security Scanners
3
DefectDojo Integration
Native
CI/CD Gate
Built-in
Deployment
Docker

Everything you need for automated security

A single CLI that orchestrates multiple scanners, syncs findings, and enforces policies, all in one pipeline step.

Parallel Execution

Multi-Scanner Support

Runs KICS (IaC), Grype (SCA), and OpenGrep (SAST) concurrently in two phases, automatically skipping scanners whose prerequisites failed.

Auto-Managed

DefectDojo Sync

Automatically creates and manages engagements per project/branch. Uploads findings, closes stale results, and deduplicates, all hands-free.

CI/CD Ready

Security Gate

Fail the pipeline when finding counts exceed configurable thresholds per severity. Security gates are applied after findings are aggregated and deduplicated across all scanners, making them simpler and more accurate than managing thresholds per tool.

Smart Lifecycle

Branch-Aware Engagements

Protected branches get 1-year engagements. Feature branches get 1-week windows. Expired engagements are extended automatically.

Zero Setup

Docker-First

Pre-bundled Docker image ships with KICS, OpenGrep, Grype, and Syft already installed. Just mount your code and run.

Granular Control

Flexible Thresholds

Configure per-severity thresholds with cumulative evaluation, e.g. fail on 1 critical OR 5+ high findings. Case-insensitive, composable rules.

Open Source

No Vendor Lock-in

ScopeGuardian and its entire ecosystem are open source. You own your toolchain, your data, and your pipeline. No proprietary dependencies, no lock-in.

Powered by industry-leading scanners

ScopeGuardian orchestrates best-in-class open source security tools, each specialised for a different attack surface.

KICS

Infrastructure-as-Code Scanner

Detects security vulnerabilities, compliance issues, and misconfigurations in Terraform, Dockerfile, Kubernetes, Ansible, CloudFormation and more. Findings are tagged with IACST.

TerraformDockerfileKubernetesAnsible

Grype + Syft

Software Composition Analysis

Syft generates an SBOM and Grype scans it for known CVEs. Supports ignoring unfixable states (wont-fix, not-fixed) and resolving transitive Java dependencies. Findings tagged SCA.

CVE DetectionSBOMJava TransitiveMulti-lang

OpenGrep

Static Application Security Testing

Pattern-based SAST using Semgrep-compatible rules. Findings are enriched with severity from metadata before upload and tagged SAST in DefectDojo.

SASTSemgrep RulesMulti-languageCustom Rules

How it works

ScopeGuardian uses a deterministic, two-phase execution model that handles prerequisites, parallel scanning, and result publishing.

01

Parse & Configure

CLI flags and config.toml are parsed. Scanners are registered based on which sections exist in the config file.

02

Phase 1: Prerequisites

Syft SBOM generation runs concurrently. This must complete before Grype can execute.

03

Phase 2: Scanning

KICS, Grype, and OpenGrep run concurrently. Scanners with failed prerequisites are skipped.

04

Sync to DefectDojo

When --sync is set, findings are uploaded to the managed engagement. Stale findings are auto-closed.

05

Gate Evaluation

When --threshold is set, counts are checked. Fail → exit(-1) to block the pipeline.

Up and running in minutes

Build from source or pull the Docker image. A single TOML config file controls which scanners run and how.

1. Build the binary

go build -o ScopeGuardian .

2. Create your config

# config.toml
path = "./my-service"

[kics]
platform = "Dockerfile"

[grype]
ignore_states = "not-fixed,unknown"

[opengrep]

3. Run the scan

SCAN_DIR=/path/to/repos \
./ScopeGuardian \
  --projectName my-service \
  --branch main \
  --sync \
  --threshold critical=1,high=5 \
  ./config.toml

Key CLI flags

FlagTypeRequiredDescription
--projectNamestringyesName of the project being scanned. Must match the product name in DefectDojo when --sync is used.
--branchstringyesBranch being scanned.
--syncboolnoUpload scan results to DefectDojo. Requires DD_URL and DD_ACCESS_TOKEN. Default: false.
--thresholdstringnoComma-separated severity thresholds that define the security gate.
-qboolnoQuiet mode: suppress all log output. Default: false.
-ostringnoWrite findings to the specified file. Banner and logs are not included; only the scan findings are written.
--formatstringnoOutput format used when -o is set. Accepted values: json (default), csv, raw (plain table).
<config-file>pathyesPath to the TOML configuration file.

Environment variables

VariableDescription
SCAN_DIRBase directory for scan operations
DD_URLDefectDojo instance base URL
DD_ACCESS_TOKENDefectDojo API v2 token

Run with Docker

The official Docker image bundles ScopeGuardian with all scanner dependencies (KICS, OpenGrep, Grype, and Syft) pre-installed. No manual setup required.

  • All scanners pre-installed and configured
  • Multi-stage build for minimal image size
  • Mount your project directory as a volume
  • Compatible with any CI/CD platform
terminal
# Build the image
$ docker build -t ScopeGuardian .
# Run a scan
$ docker run --rm \
-v /path/to/project:/tmp/data/project \
-v /path/to/config.toml:/config.toml \
-e SCAN_DIR=/tmp/data \
-e DD_URL=http://host.docker.internal:8080 \
-e DD_ACCESS_TOKEN=<your-token> \
ScopeGuardian \
--projectName my-service \
--branch main \
--sync \
/config.toml

Enforce a security gate

Configure per-severity thresholds. When counts are met or exceeded, ScopeGuardian exits with code -1 blocking the pipeline.

Without --sync, the gate is evaluated against the raw local scan output. When --sync is also provided, the gate uses the deduplicated active findings already stored in DefectDojo ensuring that duplicate or previously-closed findings never cause a false failure.

Fail on any critical

--threshold critical=1

Block the pipeline if even one critical severity finding is detected.

Combined threshold

--threshold critical=1,high=5

Fail on 1+ critical OR 5+ high findings. All rules must pass for the gate to pass.

Medium & above

--threshold medium=10

Count findings of medium severity or higher. Fail if they reach 10.

Post-deduplication evaluation with --sync and --threshold

When both --sync and --thresholdare provided, the gate is evaluated against DefectDojo's deduplicated active findings, not raw scanner output. Duplicate or previously-closed findings never inflate the count.

Support Services

ScopeGuardian is open source and free to use. ParanoiHack offers optional support plans so your team can move fast with confidence.

Community

Freeforever

Ideal for individual developers and open-source projects. Get access to the full feature set and GitHub issue tracking.

  • Full CLI & all scanner integrations
  • Public documentation & examples
  • Best-effort response via GitHub Issues
Most popular

Professional

Custom/ month

Designed for teams and small businesses that want priority help, faster response times, and guided onboarding into their CI/CD workflows.

  • Everything in Community
  • Priority email & ticketing support
  • Guided pipeline integration
  • Support for configuring the ecosystem (DefectDojo)
  • Wrapped Docker image for ecosystem compatibility
  • 48-hour response SLA

Enterprise

Customcontract

For organisations with strict compliance requirements, dedicated environments, and the need for direct engineering involvement.

  • Everything in Professional
  • Dedicated support engineer
  • Custom scanner & integration development
  • Opengrep language pack for improved vulnerability detection
  • Remote training workshops
  • On-demand cloud hosting

All plans include access to the latest open-source releases. Professional & Enterprise pricing is tailored to your team size and requirements.

Start securing your code today

Add ScopeGuardian to your CI/CD pipeline and get full visibility into your security posture, automatically.