Rufilla Lucerna
Persistent, audit-ready vulnerability
management for Yocto Linux

Why we built it
Core capability
Ingest native Yocto JSON, SPDX, CycloneDX
Persistent ignore/accept with mandatory rationale
Multiple product support with separate tracking
Role-based access and full audit trail
REST API for CI gating
One-line Docker compose for on-prem air-gap installs
Intuitive report generation in CSV, PDF and SPDX-JSON formats

Workflow
Triage Taxonomy
All changes are written to PostgreSQL with user ID, timestamp and free-text rationale—providing the evidence that UK PSTI and IEC 81001-5-1 auditors look for.

Patch
Schedule back-port

Upgrade
Move to later upstream version
Triage Taxonomy
All changes are written to PostgreSQL with user ID, timestamp and free-text rationale—providing the evidence that UK PSTI and IEC 81001-5-1 auditors look for.

Ignore

Review
Needs deeper analysis; stays red and assignable
Filtering
Slice by CVSS v3, EPSS percentile, attack vector, package wild-card or Yocto layer. Saved views become shareable URLs—your subcontractors can land on the same filtered list without needing an account if the project is set to read-only.
Continuous-use features:
Diff e-mail
Overnight scan finds new highs; you get a three-line summary with links
Bulk operations
API token
Gate nightly builds if critical CVEs remain open
Air-gap bundle

Compliance
Who Actually Use It