4 min read·HarborGuard Team
HarborGuard 1.0 — six scanners, automatic patching, ten compliance frameworks
We're shipping HarborGuard 1.0. Six bundled scanners, automatic base-image patching, ten compliance frameworks, and self-hosted under AGPL-3.0.
launchcontainer securitycompliance
Why we built HarborGuard
Every container security tool we tried had the same shape: it told you about CVEs and stopped. Triaging them, deciding what to patch, building evidence for an audit, regressing on a patched image — those were always our problem to solve outside the tool.
So we built the platform we wanted: six bundled scanners, deduplicated findings, automatic patching, SLA tracking, and ten compliance frameworks ready to export. All of it open source.
What's in the launch
- Six scanners, one finding. Trivy, Grype, Syft, Dockle, OSV-Scanner, and Dive run against every scan. Same CVE reported by three engines becomes one finding with each engine's attribution preserved.
- Patching, not just reporting. Vulnerable base images can be rebuilt automatically with Buildah or Copa, signed, and re-scanned to confirm the fix.
- SLA tracking built in. Per-severity remediation deadlines fire warning notifications 24 hours before breach and breach notifications at the deadline. Every Slack, PagerDuty, webhook, and email channel is supported.
- Ten compliance frameworks. SOC 2, PCI-DSS, NIST 800-53, ISO 27001, FedRAMP, HIPAA, CMMC, CIS Docker, NIST 800-190, NIST 800-171. Reports are generated on demand from continuously collected evidence.
- Self-hostable. AGPL-3.0. Run it on Fly.io, Kubernetes, or any Docker host. Same code as the SaaS at harborguard.co.
What's next
The next milestones on our public roadmap:
- Attestations (in-toto, Sigstore) on patched images.
- Reachability scoring — does the vulnerable function actually run?
- Container drift detection in CI for golden-base-image programs.
Star the repo and drop us a note if you want any of those moved up the queue.