Every capability mapped side by side.
| Capability | Auditor Core v2.2 | Sentinel Core v2.2 |
|---|---|---|
| Core Purpose | ||
| Primary role | Deep audit β find all vulnerabilities | Real-time gate β block policy violations |
| Execution model | On-demand CLI scan | Pre-commit hook + CI/CD pipeline |
| Output type | Risk list with SPI score + AI verdicts | ALLOW / BLOCK (exit 0 / exit 1) |
| Version | v2.2 | v2.2 |
| Detection Engines | ||
| Total detectors | 11 detectors | 11 detectors (via embedded Auditor Core) |
| Bandit (Python SAST) | Full deep scan | Changed files only |
| Semgrep (multi-lang SAST) | Full deep scan | Changed files only |
| Gitleaks (secrets in git history) | Full history scan | Current commit |
| Secret Detector | 30+ patterns, all file types | Critical patterns for BLOCK |
| CICD Analyzer | GitHub Actions, Jenkinsfiles, scripts | SHA pinning enforcement |
| IaC Scanner | Terraform, Docker, K8s, Helm | Policy enforcement on IaC commits |
| Dependency Scanner | CVE lookup, license check | Blocks unpinned / vulnerable deps |
| License Scanner | GPL / copyleft detection | Policy-defined allowed licenses |
| Bridge Detector | Cross-repo bridge exposure | Blocks bridge misconfigurations |
| SAST Scanner | SQLi, XSS, command injection, crypto | Critical severity only |
| Slither (Solidity) | Smart contract analysis (optional) | Not included |
| AI Advisory Layer | ||
| Primary AI engine | Gemini 2.5 Flash | Gemini 2.5 Flash |
| Fallback AI engine | Groq β Llama 3.3 70B | Groq β Llama 3.3 70B |
| Auto quota fallback | Automatic, no intervention needed | Automatic, no intervention needed |
| AI false-positive filter | AI VERIFIED / AI FALSE POSITIVE badges | Eliminates FP before BLOCK decision |
| Offline fallback (no AI) | Full scan without AI enrichment | Core enforcement continues offline |
| Scoring & Reporting | ||
| Scoring formula | WSPM v2.2 β SPI (0β100) | No score β binary ALLOW / BLOCK |
| SPI posture labels | Critical / High-Risk / Vulnerable / Resilient / Hardened | Not applicable |
| Gate Override (CRITICAL cap) | Grade capped at C when CRITICAL in production | BLOCK enforced regardless of SPI |
| PDF Executive Summary | 7-page, SOC 2 / cyber insurance ready | PDF Evidence Appendix per blocked commit |
| HTML report | Full interactive report with AI badges | Violation report per blocked commit |
| JSON output | Machine-readable findings + framework_summary |
Structured block event |
| SOC 2 / CIS / ISO 27001 mapping | Every finding tagged to controls | Controls in GitHub Issue alerts |
| CWE mapping | Each finding linked to MITRE CWE | Policy violations reference CWEs |
| GitHub Issues alert | Not applicable | Auto-created on every BLOCK |
| Integration & Deployment | ||
| Pre-commit hook | Optional | Installed automatically by start.sh |
| CI/CD pipeline gate | Scheduled scan / PR comment | Hard gate β blocks push on violation |
| Installation | pip install or bash start.sh | bash start.sh in target repo |
| Delivery method | Public GitHub repository | Secure email archive |
| Supported OS | Linux, macOS, Windows | Linux, macOS, Windows |
| Python requirement | Python 3.10+ | Python 3.10+ |
| Security & Privacy | ||
| Telemetry | None β 0 data collected | None β 0 data collected |
| Network required at runtime | Optional (AI enrichment uses API) | No β 100% offline capable |
| Air-gap compatible | Core yes, AI layer no | Full air-gap support |
| License binding | Hardware Machine ID | Hardware Machine ID (stricter) |
| Core logic obfuscation | Cython-compiled .so binaries | Cython-compiled .so binaries |
| Self-update / remote rules | Never | Never |
Choose based on your security objective and workflow stage.
Maximum protection through defence in depth. Audit the past β enforce the future.
Auditor Core scans entire repo. SPI score established. Full findings report generated.
Team addresses critical findings using the detailed AI-verified report as a roadmap.
Sentinel installed in every active repo. Pre-commit hook + CI/CD pipeline enforced.
Auditor Core re-run quarterly. SPI trend tracked. Sentinel policy updated if needed.
Past risks documented. New risks blocked automatically. Full posture sovereignty.
Start with Auditor Core to establish your security baseline and SPI score. Deploy Sentinel immediately after to prevent regression. Run Auditor Core quarterly β use the delta as your compliance evidence.
Start with an Enterprise Audit