Security Team Org Inventory and Compliance Handoff
Security Team Org Inventory and Compliance Handoff
Use this workflow when platform or security teams need the recommended minimum-now Wrkr path: deterministic org posture first, then compliance-ready evidence that can be verified offline.
Exact commands
Hosted prerequisites for this path:
- pass
--github-api https://api.github.com(or setWRKR_GITHUB_API_BASE) - provide a GitHub token for private repos or to avoid public API rate limits
- token resolution order is
--github-token, configauth.scan.token,WRKR_GITHUB_TOKEN, thenGITHUB_TOKEN - fine-grained PAT guidance: select only the target repositories and grant read-only repository metadata plus read-only repository contents
- connector endpoints:
GET /orgs/{org}/repos,GET /repos/{owner}/{repo},GET /repos/{owner}/{repo}/git/trees/{default_branch}?recursive=1,GET /repos/{owner}/{repo}/git/blobs/{sha} - if hosted prerequisites are not ready yet, start with
wrkr scan --path ./your-repo --jsonorwrkr scan --my-setup --jsonfirst and return to this flow when GitHub access is configured
wrkr scan --github-org acme --github-api https://api.github.com --state ./.wrkr/last-scan.json --timeout 30m --profile assessment --json --json-path ./.wrkr/scan.json --report-md --report-md-path ./.wrkr/scan-summary.md --sarif --sarif-path ./.wrkr/wrkr.sarif
wrkr evidence --frameworks eu-ai-act,soc2,pci-dss --state ./.wrkr/last-scan.json --output ./wrkr-evidence --json
wrkr verify --chain --state ./.wrkr/last-scan.json --jsonwrkr evidence now requires the saved proof chain to be intact before it stages or publishes a bundle, and wrkr verify --chain --json remains the explicit operator/CI integrity gate.
If a hosted org scan is interrupted, rerun the same target with --resume to reuse checkpointed materialization state under the scan-state directory:
wrkr scan --github-org acme --github-api https://api.github.com --state ./.wrkr/last-scan.json --resume --json --json-path ./.wrkr/scan.jsonInterpretation notes:
- retry, cooldown, resume, and completion progress lines are additive stderr-only operator UX in
--jsonmode partial_result,source_errors, orsource_degradedmeans the org posture is incomplete and should be rerun before downstream campaign-style aggregationorg-checkpoints/is resumability metadata beside the scan state, not a proof artifact--resumerevalidates checkpoint files and reused materialized repo roots before detector execution, so symlink-swapped resume state is blocked as unsafe
Optional deeper triage after the saved state exists:
wrkr mcp-list --state ./.wrkr/last-scan.json --gait-trust ~/.gait/trust-registry.yaml --json
wrkr report --top 5 --jsonExpected JSON keys
scan --github-org:status,target,findings,ranked_findings,top_findings,inventory,repo_exposure_summaries,profile,posture_scoreinventory.security_visibility_summarygives you the additiveunknown_to_securitycounts and reference basis for that runagent_privilege_map[*]is instance-scoped and includesagent_instance_id,write_capable, andsecurity_visibility_status
evidence:status,output_dir,frameworks,manifest_path,chain_path,framework_coverageverify:status,chainmcp-list:status,generated_at,rows, optionalwarningsreport:status,generated_at,top_findings,total_tools,summary
How to frame the results
scanandmcp-listanswer inventory, privilege, and trust-overlay questions.scan --profile assessmentgives the bounded customer-readout view of risky write paths first while leaving raw findings and proof artifacts intact.scanis the place to count unknown-to-security write-capable paths; useinventory.security_visibility_summary.unknown_to_security_write_capable_agentsonly wheninventory.security_visibility_summary.reference_basisis present for that run.reportgives the ranked operator summary for triage.reportis a saved-state renderer for static posture and offline proof artifacts; it is not a live observation surface.evidencepackages the saved posture into portable proof artifacts only when the saved proof chain is intact, andverifyremains the explicit machine gate for proof integrity.
Scope boundary
Wrkr does not perform live MCP probing or package/server vulnerability assessment in this workflow. Use dedicated scanners such as Snyk for those surfaces. Gait interoperability is optional and provides control-layer context rather than a requirement to run Wrkr.
Canonical state, baseline, manifest, and proof-chain paths are documented in `docs/state_lifecycle.md`.