Glasswall / Patch-Gap Operations

Public fixes should create action before attackers create pressure.

Glasswall is a GitHub-native patch-gap operations tool. It ranks public-fix exposure, plans the smallest safe upgrades, and can open remediation pull requests before backlog culture turns a known problem into an exploited one.

What it solves

The gap after a fix lands and before most teams patch.

Most tooling is built for inventory, compliance, or broad CVE visibility. Glasswall is built for the narrower and uglier problem that matters when exploit development gets faster: a public fix landed, and you need to know what is newly dangerous right now, then actually ship the smallest safe fix.

Signal Patch-gap urgency
Action Remediation PRs
Scoreboard Patch-gap MTTP
Feed Newly Dangerous

Workflow

One queue across CLI, API, Actions, and GitHub App mode.

1. Scan

Parse resolved manifests, enrich OSV and CISA KEV data, and rank urgency with explicit rationale.

2. Plan

Choose the lowest version that clears the visible advisory set and keep unsupported paths explicit.

3. Remediate

Apply safe supported upgrades for Python and exact-pinned npm repos locally or in CI, then surface the change as a GitHub-native workflow.

4. Pressure

Use PR comments, remediation branches, MTTP analytics, and a newly dangerous feed so public-fix risk becomes hard to ignore.

Why GitHub-native matters

  • PR comments keep patch-gap visibility where code review already happens.
  • GitHub Actions can fail on urgency thresholds and emit SARIF plus remediation summaries.
  • Webhook-driven remediation PRs turn a ranked finding into a branch and pull request.

Category thesis

Vulnerability scanners count problems. Patch-gap operations compress time between public fix and real patching.

The metric to own is resolved patch-gap MTTP. Everything in Glasswall now points toward that.