Ship release evidence
your security buyers
actually accept.
Product-security evidence packs for EU-facing SaaS teams. From late 2027, the EU Cyber Resilience Act requires manufacturers of products with digital elements to maintain SBOMs, handle vulnerabilities, and report actively exploited issues. VulnTrail turns the artifacts your CI already produces into a signed, customer-ready evidence pack for every release.
A buyer asks for your SBOM and CVE status. The thread sits for nine days.
Your scanners catch everything. Your team triages quietly in Slack. But every customer security review ends with someone hand-assembling a PDF that will not match the next release.
Triage lives somewhere. Evidence lives nowhere.
- SBOMs regenerate each build but nobody saves them per release.
- CVE decisions are buried in Jira tickets, Slack threads, and one engineer's head.
- "Not affected" never has a written justification when the auditor asks.
- Each customer review is a 4-hour scramble to rebuild what you knew last month.
One bundle per release. Receipts for every decision.
- Your CI emits a signed evidence bundle on every tag: SBOM, findings, release metadata, and hashes.
- Reviewers attach OpenVEX-correct decisions with linked evidence and approval state.
- Export a customer-ready evidence pack as PDF, JSON, or CSV the same day the request lands.
- Hash-chained audit trail. Delete or export on demand. No source code uploaded.
The CRA enforcement window is already in your release cycle.
Vulnerability handling, SBOM documentation, and incident reporting obligations land in production over the next two release cycles. The teams that wait will hand-assemble paperwork. You will not.
Maintain an SBOM for each product.
Documented, machine-readable, covering at minimum the top-level dependencies of products with digital elements.
Handle vulnerabilities without delay.
Identify, document, and remediate with a coordinated disclosure process and free security updates for supported releases.
Report actively exploited vulnerabilities.
Early warning within 24 hours, vulnerability notification within 72 hours, and a final report within 14 days to ENISA's SRP.
VulnTrail organizes the operational evidence the CRA expects you to hold. It is not a conformity-assessment service and does not certify compliance. It gives your team, auditor, counsel, and customers a defensible paper trail per release.
Local/CI-first by design. Three commands and one upload.
VulnTrail never sees your source. The CLI runs where your build runs: in CI, on a laptop, behind your firewall. We only process the artifacts you choose to send.
Bundle release artifacts locally
The Evidence CLI validates your CycloneDX SBOM, normalizes scanner output from Grype, Trivy, OSV-Scanner, or Dependency-Track, and stamps everything with hashes and release metadata.
Triage with VEX-correct decisions
The portal imports your bundle, dedupes findings across scanners, and surfaces KEV, EPSS, and fix availability. Reviewers attach not_affected, affected, fixed, or under_investigation with mandatory justification.
Export the evidence pack
Generate a customer-ready evidence pack: product inventory, component summary, prioritized findings, decision log with reviewers and timestamps, and a hash-chained audit trail.
One workspace for every release, every finding, every decision.
A workflow that survives a customer security review and the next one after that.
38 findings across 220 components
CVE-2025-30811 - lodash prototype pollution
OpenVEX status
RequiredDecision metadata
Linked evidence
Each link is hashed at attach time and re-checked when the evidence pack is generated.
Export evidence pack
Include in pack
The release-evidence layer your scanners and your buyers were both missing.
No source. No tokens.
We do not hold a GitHub app, OAuth token, repository URL, source upload, or secrets. Your CI generates the bundle; we read JSON artifacts.
OpenVEX, done correctly.
Only the four valid statuses: not_affected, affected, fixed, and under_investigation. Justifications are not custom statuses.
EU-region by default.
EU-hosted infrastructure for EU tenants, with a published subprocessor list, DPA, deletion/export, and a 30-day diagnostic retention default.
Evidence, not opinion.
VulnTrail organizes operational evidence and reviewer decisions. It does not certify CRA, NIS2, SOC 2, or ISO 27001, and exports say so plainly.
A trust model you can defend to your own security team.
Every assertion in VulnTrail carries source, timestamp, actor, artifact hash, and approval state. The audit log is hash-chained and exportable. Cross-tenant access is tested, not assumed.
Tenant isolation, tested
Database-level org scoping with central authorization helpers and tests that attempt cross-tenant access.
Hash-chained audit log
Every event carries previous hash and current hash. Export the chain and verify it offline.
30-day default retention
Diagnostic bundles auto-delete after 30 days unless a subscription extends retention.
Parser hardening
Strict schema validation, size limits, content-type checks, malformed-input fixtures, and no shell execution.
One offer. One fixed fee. One release.
Start with a paid diagnostic. Walk away with a customer-ready evidence pack you can hand to your next enterprise buyer and a clear map of every gap found along the way.
CRA Product-Security Evidence Diagnostic
We run one of your products and one of your releases end to end. You leave with the evidence pack your next enterprise security review is going to ask for plus a clear map of every evidence gap.
// You leave with
- Product and release inventory
- SBOM baseline with coverage warnings
- Vulnerability evidence snapshot
- VEX-style triage template, populated
- Evidence-gap report with named owners
- Customer-facing readiness summary (PDF)
- Hash-chained audit trail you can verify offline
After the diagnostic, the workflow stays.
Most customers do not stop at one evidence pack. They move the workflow into CI and turn it into how every release goes out the door.
Evidence for every release
The CLI moves into your CI. Every tag ships with a signed bundle and a fresh evidence pack.
A workflow your whole team runs
Add products, reviewer queues, role-based access, and approval workflows as security-review volume grows.
A trust posture buyers respect
SSO, advanced integrations, custom retention, customer-portal exports, and procurement-friendly contracting come later.
Questions buyers and engineers actually ask.
Do you scan my source code or repos?
Is this a CRA or NIS2 compliance certification?
Why local-first instead of hosted scanning?
Which SBOM and scanner formats do you support?
How is data handled and where is it hosted?
How is this different from ASPM, Dependency-Track, or a trust center?
Stop hand-assembling PDFs the night before a security review.
Book the founding diagnostic. We will run one release end to end and hand back the evidence pack your next enterprise buyer is going to ask for.