Flow
Repository containing source code of MixewayFlow service that is Swiss army knife for DevSecOps Teams
Install / Use
/learn @Mixeway/FlowREADME
Mixeway Flow — DevSecOps Swiss Army Knife 🔐⚙️
Mixeway Flow integrates security into your SDLC from day one. It aggregates results from built-in scanners, hooks seamlessly into Git (webhooks), and presents everything in a single, actionable dashboard.
Under Development: we are building an AI/LLM-powered verification engine that combines detected findings with extended vulnerability intelligence and then verifies, in your own source code, whether a specific vulnerability is truly present and exploitable. The goal is to deliver 100% accurate, properly prioritized information for engineers and security teams. This feature will be available in a future release (see the details below).
Available demonstration: https://flow.mixeway.io
Table of Contents
- Why Mixeway Flow?
- How it Works
- What’s Scanned
- AI/LLM Verification — Under Development
- Quick Start
- Initial Setup
- Screenshots
- Documentation
- Contributing
- Community
- License
Why Mixeway Flow?
- One dashboard to rule them all — SAST, SCA, IaC, and secret scanning in one place.
- Zero CI friction — Git webhooks trigger scans automatically; no complex pipeline wiring needed.
- Focus on what matters — Suppress/ignore by context to cut noise and prioritize real risk.
- Fast time-to-value — Docker Compose install; be up and reviewing findings in minutes.
- Built for the next step — Designed to plug in an AI/LLM verification layer that validates exploitability directly in your codebase.
How it Works

- Register a Git repository (URL + access token). An initial scan runs on the latest commit of the default branch.
- Configure a webhook (GitHub/GitLab). Each push or PR/MR triggers a scan; events are queued if needed.
- Review results in the unified dashboard and act.
What’s Scanned
Each scan runs transparently from a developer/CI/CD perspective. You get consistent results without extra ceremony.
SAST (Bearer)
Static analysis of your team’s source code for injection flaws, insecure patterns, and more.
Requirements: none — runs for every change.
Engine: https://github.com/Bearer/bearer
SCA (SBOM + OWASP Dependency-Track)
Find known vulnerabilities, licensing issues, and outdated libraries via SBOM ingestion.
Requirements: place sbom.json in the repo root to enable SCA scans.
Engine: https://github.com/DependencyTrack/dependency-track
IaC (KICS)
Scan Terraform, Kubernetes manifests, Dockerfiles and other templates for misconfigurations.
Requirements: none — runs for every change.
Engine: https://github.com/Checkmarx/kics
Detect accidentally committed credentials (API keys, tokens, passwords) before they become incidents.
Requirements: none — runs for every change.
Engine: https://github.com/gitleaks/gitleaks
Secret Leaks (gitleaks)
Detect accidentally committed credentials (API keys, tokens, passwords) before they become incidents.
Requirements: none — runs for every change.
Engine: https://github.com/gitleaks/gitleaks
GitLab Repository Scanner (Mixeway ruleset)
First-class checks for 15+ GitLab repository/security misconfigurations using our curated ruleset.
Examples of detections:
- No or weak branch protection on default branches (force-push allowed, missing approvals).
- Unknown or untrusted runner registered to the project/group.
- Secrets such as passwords or tokens stored in GitLab CI/CD variables without masking/protection.
- Insecure merge request settings (missing code review/approvals).
- Public exposure of private projects via inherited visibility or incorrect sharing.
- Missing or lax Protected Tags / Protected Branches configuration.
- Pipeline triggers and webhooks with overbroad permissions.
- Artifact exposure / retention misconfigurations.
How it works: Mixeway queries repository and project metadata, CI settings, and protection rules to evaluate policy compliance and highlight risky gaps with actionable remediation tips.
Requirements: repository access with permissions to read project settings and CI/CD configuration (token or PAT).
AI/LLM Verification — Under Development
We are building a complementary AI-assisted verification layer that operates on top of your scans to decide if a vulnerability is actually exploitable in your codebase. This project combines three pillars:
-
Detected Findings
Ingests and normalizes SAST, SCA (SBOM), IaC, and secret-scan outputs from Mixeway Flow. -
Extended Vulnerability Intelligence
Enriches findings with structured threat intelligence (e.g., CVE metadata, CWE, CVSS, KEV/“known exploited”, EPSS-like probabilities, exploit-exists signals, advisories, references). -
Code-Aware AI/LLM Reasoning
Uses large language models and domain-specific rules to analyze your repository’s source code and verify whether the conditions required for exploitation are present.- Produces a constraint checklist for each vulnerability (e.g., reachable sink, untrusted data flow, missing input validation, vulnerable library version & call-site usage).
- Maps verification to concrete code locations (files, functions, lines) and execution paths.
- Reduces false positives and upgrades critical issues that meet exploitability conditions.
- Outputs actionable remediation steps aligned to the exact code context.
Outcome & Goal
- Target: deliver 100% accurate and properly prioritized results for developers and AppSec.
- Status: under active development; will be released as a future version of Mixeway Flow.
- Early Access: if you’re interested in testing this capability, open an issue or ping us on Discord.
Note: “100% accurate” reflects the design goal for precision and prioritization in verified results; real-world performance will be transparently documented with evaluation datasets when the feature ships.
Quick Start
Prereqs: Docker Hub access +
docker-compose
Minimum: 2 CPU, 16 GB RAM, 50 GB disk
Recommended: 4 CPU, 32 GB RAM, 100 GB disk
Option A — Clone and run
git clone https://github.com/Mixeway/flow
cd flow
docker-compose up
Option B — One-file docker-compose.yml
cat <<'EOF' > docker-compose.yml
version: '3.8'
services:
backend:
image: mixeway/flow-api:latest
container_name: flowapi_backend
ports:
- "8888:8888"
- "8443:8443"
environment:
SSL: "TRUE"
volumes:
- pki_data:/etc/pki
- dependency_track_data:/root/.dependency-track
depends_on:
- flowdb
flowdb:
image: postgres:latest
container_name: flowdb
ports:
- "5432:5432"
environment:
POSTGRES_DB: flow
POSTGRES_USER: flow_user
POSTGRES_PASSWORD: flow_pass
volumes:
- flowdb_data:/var/lib/postgresql/data
flow:
image: mixeway/flow:latest
container_name: flow_frontend
ports:
- "443:443"
volumes:
- flow_data:/etc/nginx/ssl
depends_on:
- backend
volumes:
flowdb_data:
flow_data:
pki_data:
dependency_track_data:
EOF
docker-compose up
What comes up:
- Postgres database
- Backend with self-signed TLS + Dependency-Track
- Frontend (nginx)
App URL:https://localhost:443
Default login:admin / admin→ you’ll be prompted to change it on first login.
⚠️ Security note: Self-signed certs are for local trials. For any shared/staging/prod use, replace with proper certificates and rotate the default credentials immediately.
Initial Setup
- Create a Team
- Import your repository
- Register a webhook on your Git provider (GitLab/GitHub)
Then start exploring findings in the Vulnerabilities view.
Screenshots
-
Webhook configuration

-
Vulnerabilities overview

-
Scans overview

Documentation
Under construction — contributors welcome to help outline and write the first docs pages (setup, configuration, SBOM generation tips, troubleshooting).
Contributing
We ❤️ contributions — from bug fixes and docs to new rules and integrations.
- Read CONTRIBUTING.md to get started
- Look for issues labeled good first issue and help wanted
- Propose ideas in Discussions or on Discord (link below)
- Please keep PRs focused and include context, screenshots, and tests where possible
Community
- Discord: https://discord.gg/76RY2Y82
- Issues: Use GitHub Issues for bugs and feature requests
- Security: Please avoid posting sensitive details in public tickets. For suspected vulnerabilities, contact maintainers privately.
License
This project is licensed under the FlowLicense. See LICENSE.md for details.
Related Skills
healthcheck
345.4kHost security hardening and risk-tolerance configuration for OpenClaw deployments
node-connect
345.4kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
prose
345.4kOpenProse VM skill pack. Activate on any `prose` command, .prose files, or OpenProse mentions; orchestrates multi-agent workflows.
frontend-design
104.6kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
