No source upload, ever
Scans run entirely on your build hosts. OSV vulnerability lookups gated behind a single flag (--no-osv) for fully air-gapped environments.
Enterprise · Air-gapped · Self-hosted
Nox runs on your build hosts, with a private plugin registry, a managed Ed25519 signer keyring, and a SLSA Level 3 release attestation chain. Operators in regulated industries — finance, healthcare, defence, EU sovereign cloud — adopt Nox precisely because the SaaS-required scanners they're forced to evaluate cannot meet their data-residency or supply-chain requirements.
Core principles
Scans run entirely on your build hosts. OSV vulnerability lookups gated behind a single flag (--no-osv) for fully air-gapped environments.
Zero outbound network calls beyond operator-initiated plugin installs. Auditable: open-source, deterministic, single binary.
Every detection rule, the trust verifier, the plugin SDK — all open-source under Apache 2.0. No proprietary lock-in.
Fit check
If you check three or more of these, Nox is likely the strongest open-source option for your environment:
Capabilities
Beyond the default Sigstore-keyless trust policy, organisations can bind plugin installs to a curated set of Ed25519 keys. The enterprise trust policy refuses any artifact whose signer key is not in the local keyring.
# .nox.yaml
plugins:
trust_policy: enterprise
signer_keyring:
- name: acme-security
pubkey_pem: |
-----BEGIN PUBLIC KEY-----
...your Ed25519 pubkey...
-----END PUBLIC KEY----- Run an internal plugin registry that mirrors the public official registry plus your own custom plugins. Operators discover and install via the same nox plugin install UX.
# .nox.yaml
plugins:
registries:
- acme=https://nox-registry.acme.internal/index.json
required:
- acme/internal-secrets-pack@>=1.2
- nox/reachability
- nox/grc Mirror the registry into your artifact server, sign with your keyring, distribute the nox binary via internal channels. No network calls required at scan time.
nox plugin install nox/grc \
--registry https://artifacts.acme.internal/nox-mirror.json \
--trust-policy enterprise
# Or set the registry persistently:
nox registry add https://artifacts.acme.internal/nox-mirror.json \
--name acme-mirror nox/grc covers 12 frameworks: SOC 2, ISO 27001, GDPR, FedRAMP Low / Moderate / High, HIPAA, PCI-DSS, NIST 800-53, NIST CSF, CIS v8, CMMC. Generate audit-ready evidence bundles directly from scan output.
nox plugin call grc gap_report \
framework=fedramp-moderate \
output=fedramp-moderate-gap.json Every nox release ships a SLSA v1.0 provenance attestation alongside cosign keyless signatures. Enterprises verify both before promoting to production.
cosign verify-attestation \
--certificate-identity-regexp \
"(?i)https://github.com/Nox-HQ/nox/.github/workflows/.*" \
--certificate-oidc-issuer \
https://token.actions.githubusercontent.com \
--type slsaprovenance \
nox Internal AI agents query scan results through the built-in MCP server. Read-only tools, workspace allowlisting, output size limits. Drop-in for Claude Desktop / Cursor / your internal MCP host.
# Internal MCP host config
{
"mcpServers": {
"nox": {
"command": "/usr/local/bin/nox",
"args": ["serve", "--allowed-paths", "/repos"]
}
}
} Talk to us
We're a small team focused on making Nox excellent at its core mission. Enterprise inquiries — private registry hosting, signed evaluation reports, custom rule pack development, scoped security review of your AI integration patterns — go to the address below.
Open-source-only deployments stay free under Apache 2.0 forever. Enterprise inquiries help us prioritise the roadmap (next: managed private registry hosting, signed evaluation reports for procurement teams, GitHub Actions runner appliance for air-gapped CI).