VEX (Vulnerability Exploitability eXchange) tells you whether vulnerabilities actually matter in your specific environment. Instead of just listing CVEs, VEX provides context about real exploitability and practical risk assessment.
Traditional vulnerability scanners generate overwhelming noise - reporting every CVE found in dependencies without considering whether they're actually exploitable. Security teams waste critical time triaging hundreds of theoretical vulnerabilities while real threats go unaddressed.
Common Issues:
- False Positives: Vulnerable libraries that aren't actually reachable by attackers
- Context Blindness: Scanners can't evaluate runtime protections, network controls, or application-specific mitigations
- Alert Fatigue: Teams become desensitized to constant vulnerability reports
- Resource Misallocation: Critical effort spent on non-exploitable CVEs instead of real security gaps
This workflow addresses fundamental gaps in traditional security assessment by focusing on actual risk rather than theoretical vulnerability presence. The exploitability analysis phase performs deep technical investigation that answers the critical question: "Can an attacker actually exploit this in our specific environment?"
Technical Depth Required:
- Code Reachability Analysis: Tracing execution paths from entry points to vulnerable functions
- Attack Surface Mapping: Identifying realistic attack vectors and prerequisites
- Environmental Context: Evaluating protective controls, deployment configurations, and runtime defenses
- Exploitation Feasibility: Assessing real-world conditions needed for successful attacks
Beyond CVE Catalogs: While CVE databases document known vulnerabilities, they can't evaluate your specific implementation context. A CVE marked "Critical" may be completely unexploitable due to how your application is architected, deployed, or protected. Conversely, application-specific vulnerabilities not captured in any CVE database may pose significant risk.
Supply Chain Transparency: VEX documents provide standardized communication about vulnerability status across development teams, security organizations, and third-party vendors. Instead of blanket vulnerability reports, stakeholders receive evidence-based determinations about actual risk exposure.
This automated workflow generates three comprehensive security deliverables:
- π Summary - Executive overview of critical findings
- π Security Reports - Detailed technical analysis with exploitability details and remediation guidance
- π VEX Document - Industry-standard OpenVEX-compliant exploitability determinations generated using the VEX Document MCP Server
π Example Reports: docs/security/reports/
This project provides two complementary security analysis workflows:
Complete security assessment workflow that scans your application, analyses exploitability, and generates standardized VEX documentation.
Use when: Starting security assessment from scratch or need comprehensive vulnerability analysis
Advanced exploit analysis that takes existing security reports and creates detailed technical documentation for each CVE vulnerability.
Use when: You have existing security reports and need deeper technical analysis for specific CVEs
Traditional vulnerability scanners generate overwhelming noise - reporting every CVE found in dependencies without considering actual exploitability. This project focuses on evidence-based risk assessment rather than theoretical vulnerability presence.
Key Benefits:
- π― Evidence-Based Analysis: Every determination backed by concrete technical proof
- π Beyond CVE Scanning: Discovers application-specific vulnerabilities through OWASP Top 10 review
- π Risk-Based Prioritization: Focus resources on vulnerabilities that pose actual threat
- π Industry Standards: OpenVEX-compliant documents for transparent vulnerability communication
- β‘ Automated Intelligence: Combines scanning tools with human-level security analysis
Complete end-to-end security assessment workflow
-
Start Assessment: Open GitHub Copilot and use the security scan prompt
-
Provide Details: Copilot will ask for:
- Report Name:
my-app-security-assessment - Product Name:
my-application - Scope:
src/(directories to analyze)
- Report Name:
-
Automated 4-Step Process:
- π Comprehensive Scanning: Trivy identifies CVEs, misconfigurations, secrets, and license issues
- π§ Exploitability Analysis: Rigorous technical analysis determining actual exploitability
- π OWASP Top 10 Review: Manual review for application-specific vulnerabilities
- π VEX Documentation: Generate OpenVEX-compliant industry-standard documents
Results: Three deliverables automatically saved to docs/security/reports/[report-name]/:
- π Summary - Executive overview of critical findings
- π Security Report - Detailed technical analysis with remediation guidance
- π VEX Document - Industry-standard exploitability determinations
Advanced technical analysis for existing security reports
-
Prerequisites: Existing security report with CVE findings (from Mode 1 or other sources)
-
Start Analysis: Open GitHub Copilot and use the deep CVE analysis prompt
-
Select Report: Copilot will show available reports in
docs/security/reports/ -
7-Step Deep Analysis Process:
- π CVE Report Analysis: Extract and prioritize ALL CVEs from existing reports
- π Intelligence Gathering: Deep research using vulnerability databases
- π§© Library Integration Analysis: Trace vulnerable library usage in application context
- π― Exploit Development: Create theoretical proof-of-concept demonstrations (documentation only)
- π Individual CVE Documentation: Generate detailed exploit analysis per CVE
- βοΈ Progress Tracking: Manage analysis queue and context clearing
- π Executive Summary: High-level overview after processing multiple CVEs
Results: Enhanced documentation with detailed exploit scenarios:
- οΏ½ Individual CVE Documents:
[CVE-ID]-exploit-analysis.mdper vulnerability - π Executive Summary:
executive-summary-exploit-analysis.mdwith business impact - π― Prioritized Findings: Risk-based ordering of exploitable vs non-exploitable CVEs
-
π Global Instructions: .github/instructions/vex.instructions.md - Applies to both modes
-
π¨ MCP Tools: Ensure these MCP tools are made available to the agent.
-
π Mode 1 Prompt: .github/prompts/security-scan-and-vex.prompt.md
-
π― Mode 2 Prompt: .github/prompts/deep-cve-exploit-analysis.prompt.md
-
π Example Reports: docs/security/reports/
Development Container: Pre-configured with all tools and MCP servers. Simply open in VS Code with Dev Containers extension.
Manual Setup: If not using the dev container, install these prerequisites:
# Clone and setup
git clone <repository>
cd ai_generated_vex
make setup # Installs all required tools
# Start MCP servers
make start-osv-mcp-serverPrerequisites Required:
- Docker - For OSV MCP server
- Go (v1.24+) - For vexctl installation
- Node.js (v22+) - For vexdoc-mcp installation
- Trivy (v0.63.0+) - Security scanner
The following MCP servers are automatically configured in the dev container:
{
"servers": {
"trivy-mcp": {
"type": "stdio",
"command": "trivy",
"args": ["mcp"]
},
"vexdoc-mcp": {
"type": "stdio",
"command": "npx",
"args": ["vexdoc-mcp"]
},
"osv-mcp": {
"type": "http",
"url": "http://localhost:3001/mcp"
}
}
}make help # Show all available commands
make setup # Install all required tools and dependencies
make start-osv-mcp-server # Start the OSV MCP server
make stop-osv-mcp-server # Stop the OSV MCP server
make status-osv-mcp-server # Check OSV MCP server status- π Complete Instructions: .github/instructions/vex.instructions.md
- π Example Reports: docs/security/reports/
- π VEX Specification: OpenVEX
- Trivy MCP - Security scanning MCP server
- VEX Document MCP Server - VEX document generation
- OSV MCP Server - Vulnerability intelligence
- Vulpy Test App - Vulnerable Python application for testing