What changed?
Application code, dependencies, Dockerfiles, Terraform, Kubernetes, Helm, GitHub Actions, IAM policy, network exposure, and database migrations — all classified directly from the diff.
Veridion is the release decision system for increasingly autonomous engineering teams. It determines whether a software change should safely ship, explains why, and prescribes what happens next.
Application code, dependencies, Dockerfiles, Terraform, Kubernetes, Helm, GitHub Actions, IAM policy, network exposure, and database migrations — all classified directly from the diff.
Veridion isolates risk introduced in this PR from pre-existing backlog. Teams reason about the current change, not the entire historical scanner backlog.
A scored decision, confidence level, explicit approvals, and required next steps. A release decision memo posted to the PR, not a raw finding dump.
AI increases software velocity.
Veridion governs operational trust.
The acceleration
The control problem
Semgrep, Trivy, Grype, and Syft run against both head and baseline. One bootstrap command generates the workflow with policy, trust inputs, and accepted-risk support.
Scanner output is unified into one schema. Cross-scanner duplicates collapse. Each finding is attributed as introduced or pre-existing against the baseline.
Change surface, blast radius, operational context, accepted risk, and policy are weighed to produce a deterministic 0-100 score and release verdict.
GO, CONDITIONAL GO, or NO GO — with primary drivers, required approvals, and next steps. A decision memo, not a raw scanner log.
Docs-only change
No introduced findings. Low-friction approval path. High-confidence release decision.
Code risk introduced
Introduced code risk pushes the change into a controlled release path instead of an automatic block.
Dependency + IAM + ingress
Critical dependency risk plus IAM and ingress exposure. Release blocked pending remediation and review.
Accepted-risk suppression
Known risk accepted temporarily with reason and expiry. Visibility stays intact and the release posture remains cautious.
Multi-scanner normalization, deduplication, baseline comparison, and deterministic release decisioning. Legacy debt stays separate from current change risk.
Change-surface inference across multiple risk domains. Configurable approvals, score adjustments, and accepted-risk exception handling with expiry governance.
GitHub Actions is the current wedge. The engine already accepts a versioned operational-context artifact designed for future CI systems, deployment pipelines, and autonomous delivery paths.
Primary drivers, contextual risk, required approvals, and next steps should be scannable without opening a single raw scanner log.
A suppression should never erase the truth. It should downgrade cleanly, stay visible in the PR comment, and preserve accountability with an expiry date.
Read the evaluation guide if you want to test the wedge with real PR scenarios. Use the bootstrap command when you are ready to run Veridion in a live repository and see how it governs deployment trust end to end.
veridion-bootstrap --preset application-team