your env → us
Received by VigilChain
Scanner findings (CVE, file path, snippet) · Repo metadata · CI/CD configs · AWS topology metadata · ECR image digests · Tenant repositories cloned into ephemeral workers for scan and analysis jobs
us → Anthropic
Available to AI analysis
Rule identifiers · File paths · Configuration files or snippets · Finding metadata · Relevant source files or excerpts from the cloned repo when needed for classification, narrative, or reachability analysis
not requested
Not requested / redacted
Application secrets · Environment variables · Customer data inside your services · Database contents · DB credentials · Known secret patterns before AI calls, when detected
Rule classification. Rule ID, scanner name, and rule description text. Used to map vendor rules to canonical VC taxonomy.
Dedup confirmation. Rule IDs and metadata for the candidate cluster. Usually only the cluster's metadata, though AI-assisted analysis may inspect related source files from the cloned repository when needed to resolve an ambiguous match.
Repo deployment-chain analysis. CI/CD config files (.github/workflows/*.yml, Dockerfile, infra-as-code like Terraform *.tf). These configuration files may be inspected from the cloned repository to map build, image, and deployment relationships.
Finding narrative + reachability. File path, rule context, and relevant source code from the cloned repository when needed to explain the finding or assess code-path reachability. The amount of context depends on the rule, language, and repository structure.
Reachability today is deployment-chain reachability (deterministic) plus AI-assisted code-path analysis (advisory). Not deterministic call-graph reachability today. Anthropic standard API terms apply today; prompts may be retained up to 30 days for trust-and-safety. ZDR is in negotiation. Per-tenant AI disable is on the roadmap.