nox/container ✓ Verified Dockerfile linting, image vulnerability scanning, container SBOM (22 rules)
Open-source · Apache-2.0 · Offline-first
For teams shipping LLM features — `chat.completions.create`, RAG ingest, agents with tool calls, MCP servers — Nox catches what every other scanner misses, plus secrets, deps, IaC, and containers in one deterministic pass.
Cosign-signed plugin marketplace
Every plugin in the official registry ships with a Sigstore keyless signature tied to its release.yml workflow. Nox refuses install on unsigned drops unless you explicitly relax the policy. Trust chain: `cosign(checksums.txt) ⇒ tarball SHA-256 ⇒ registry digest`.
nox/container ✓ Verified Dockerfile linting, image vulnerability scanning, container SBOM (22 rules)
nox/sast ✓ Verified Language-specific vulnerability detection (SQL injection, XSS, path traversal) — 10 rules
nox/reachability ✓ Verified Multi-language reachability for VULN findings (Go, PyPI, npm, Cargo, Maven, RubyGems, NuGet)
nox/taint-analysis ✓ Verified Cross-file & interprocedural taint flow including AI source-to-sink (TAINT-001..007 + TAINT-AI-001/002)
nox/api-abuse ✓ Verified API authorization testing (BOLA, BFLA, rate-limit) — 5 rules
nox/attack-surface ✓ Verified Static endpoint extraction and exposure mapping (Go, Python, JS/TS frameworks)
nox/dast ✓ Verified DAST web/API probes — HTTP misconfig (DAST-001..006) plus opt-in AI-DAST: prompt injection, system prompt leak, tool smuggling, cost amplification (DAST-007..010)
nox/k8s-runtime ✓ Verified Live Kubernetes cluster security scanning (KRUNT-001..008)
nox/red-team ✓ Verified Attack chain analysis and HTTP validation (REDTEAM-001..010)
nox/ai-eval ✓ Verified Adversarial prompt corpus runner — jailbreak / system-leak / role-confusion / tool-misuse against a chat endpoint (AI-EVAL-001..004)
nox/depconfusion ✓ Verified Dependency confusion detection and prevention across npm, PyPI, RubyGems, Maven
nox/baseline-mgmt ✓ Verified Finding baseline snapshots, diff, and triage — brownfield migration enabler
nox/policy-gate ✓ Verified Policy evaluation and CI gate (pass/fail) — 5 rules
nox/grc ✓ Verified GRC compliance assessment across 12 frameworks (SOC2, ISO 27001, GDPR, FedRAMP L/M/H, HIPAA, PCI-DSS, NIST 800-53, NIST CSF, CIS v8, CMMC)
nox/threat-explain ✓ Verified LLM-enhanced finding explanations and impact analysis (8 rules + LLM)
nox/threat-model ✓ Verified STRIDE-based auto-modeling with optional AI threat generation (5 rules + LLM)
nox/risk-score ✓ Verified EPSS / KEV vulnerability prioritization and severity scoring
nox/threat-enrich ✓ Verified CVE enrichment, CWE mapping, and MITRE ATT&CK correlation (13 rules)
nox/triage-agent ✓ Verified LLM-powered finding prioritization and false-positive reduction (4 rules + 7-provider LLM: openai, anthropic, gemini, ollama, cohere, bedrock, copilot)
Detection coverage
Five analyzer suites covering the full attack surface of modern applications.
API keys, tokens, and credentials across major cloud, SaaS, and CI providers with pattern + entropy detection.
Prompt injection at the call site, embedding leakage, agent over-privilege, MCP hardening, AI taint flow — full OWASP LLM Top 10 + Agentic coverage.
Terraform, Kubernetes, Docker, GitHub Actions, Helm, Ansible, Kustomize, Serverless, plus cross-resource graph analysis.
OSV.dev vulnerability lookups + reachability filtering + license compliance across 7 ecosystems.
PII detection for email, SSN, credit card, phone numbers, and healthcare identifiers.
90-second tour
A short walkthrough of the marketplace, the comparison pages, and the trust model. No audio — keep your headphones on whatever you were already listening to.
In action
Nox completes a full scan in seconds and writes machine-readable artifacts. No configuration required for a first run.
$ nox scan .
nox — scanning .
[discover] 847 files, 12 lockfiles, 3 AI components
[analyze] secrets, iac, deps, ai, data
[results] 12 findings (3 suppressed), 47 dependencies, 3 AI components
[done] wrote findings.json, results.sarif, sbom.cdx.json
$ nox plugin install nox/reachability
Trust: community (signer: cosign-keyless:.../release.yml@.*)
Installed nox/reachability@0.6.5 (community) Same inputs produce same outputs across local development and CI. No hidden state, no external service dependencies, no flaky results.
First-class OWASP LLM Top 10 and OWASP Agentic coverage alongside traditional AppSec. Prompt injection, tool safety, and model provenance are built into the core engine.
Built-in MCP server with 10 read-only tools and 5 resources. AI agents can query scan results safely without write access or code execution.
Standard artifacts
Every scan produces standard artifacts that integrate with existing security tooling and compliance workflows.
findings.json JSON Canonical findings schema for automation
results.sarif SARIF GitHub Code Scanning compatible (SARIF 2.1.0)
sbom.cdx.json CycloneDX Primary SBOM format with vulnerability data
sbom.spdx.json SPDX Secondary SBOM format for license compliance
report.html HTML Standalone dark-theme dashboard with filtering
ai.inventory.json AI Inventory AI component inventory with provenance
Adoption workflow
brew install nox
nox scan . # .nox.yaml — package.json for security
plugins:
required:
- nox/reachability
- nox/taint-analysis
- nox/grc
# Anyone cloning your repo gets the right
# verified plugins on first scan. - uses: nox-hq/nox@v0.9.5
with:
path: '.'
format: sarif
annotate: 'true'
- uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: results.sarif Nox is free to use, modify, and distribute. Contributions welcome.