Software Compliance · Deep Agents

Continuous compliance
in software, executed
by deep agents.

We implement autonomous agents that generate versioned SBOMs, triage CVEs with reachability analysis, and maintain audit evidence synchronized with the actual state of the repository.

The Problem

The compliance stack has
a layers problem.

The typical software compliance stack combines scanners (SCA, SAST, secret scanning), a ticketing system, and manual correlation work. The friction is not in the individual tools — it is in the layers that require judgment:

These are reasoning tasks over code and processes, not pattern matching. That is where a scanner + dashboard loop falls short, and where a senior engineer typically steps in to do weeks of glue work.
Deep Agents

Operational definition

A deep agent, in the context of this implementation, has three properties that distinguish it from an LLM call with tools:

01
Persistent execution loop

Works on tasks spanning hours or days, maintaining state across invocations: virtual filesystem, structured plan, execution memory.

02
Hierarchical orchestration

A principal agent decomposes the problem and delegates to specialized sub-agents — dependency analysis, control mapping, evidence writing — each with its own isolated context.

03
Real tool-use over infrastructure

Access to repos via Git, execution of static analysis, queries to NVD/OSV/GHSA, PR generation, writing versioned documents.

Implementation stack: Claude Sonnet 4.5 / Opus as the base model — orchestration with LangGraph, Semantic Kernel + MCP, or a custom stack depending on the case — MCP servers to expose client internal tools to the agent in a controlled way.
Operational Difference

Traditional pipeline
vs. Deep agent pipeline

Task Traditional pipeline Deep agent pipeline
SBOM generation On-demand, variable format, unsigned CycloneDX/SPDX signed per build, attestation via Sigstore, semantic diff against previous version
CVE triage Raw list sorted by CVSS Reachability analysis over AST, prioritization by actual exposure, upgrade path proposal
Audit evidence Dedicated sprint before the audit Incremental evidence tied to controls, generated on each merge
License compliance Monthly static report PR validation against policy-as-code, automatic blocking of incompatible licenses
Control documentation Outdated wiki Documents regenerated from the current state of the repo
Concrete Cases

What the agent does,
in detail.

Continuous SBOM

CycloneDX 1.5 / SPDX 2.3

The agent integrates into the CI pipeline. Each build produces a complete SBOM — including transitive dependencies, hashes, licenses, and provenance — signed with cosign and stored as an OCI attestation alongside the artifact. The agent compares against the previous SBOM, identifies deltas (new dependencies, upgrades, removals) and generates a natural-language changelog. For new dependencies, it runs an evaluation subroutine: package age, release frequency, maintainer distribution, CVE history, presence in typosquatting databases.

CVE Triage

Vulnerability reachability analysis

When a new CVE affects a dependency present in the SBOM, the agent determines whether the client's code actually invokes the specifically vulnerable functions. This is done by combining advisory data (affected function/class when available) with static analysis of the codebase. The output is a classification: exploitable, present-but-not-reachable, needs-manual-review. For exploitable findings, the agent evaluates the upgrade path (semver, breaking changes documented in the package changelog, existing tests) and, if risk is low, opens a PR with the update.

Control Mapping

SOC 2, ISO 27001, PCI-DSS, HIPAA

The agent maintains a map between target framework controls and verifiable artifacts in the repository: branch protection rules, CI workflow code, PR review policies, secret scanning configuration, etc. When the auditor requests evidence for a specific control, the agent assembles the package: configuration snapshot, examples of PRs that demonstrated the control in action, relevant logs, and a narrative of how the control is implemented in that particular stack.

Licenses

License compliance (policy-as-code)

Defines an acceptable license policy (e.g. permissive licenses OK, weak copyleft with review, strong copyleft blocked in proprietary code). The agent validates on each PR, and for ambiguous cases — custom licenses, dual-licensing, modified licenses — performs analysis of the actual license text against the policy.

Documentation

Internal policy generation and maintenance

Secure SDLC, dependency management, vulnerability disclosure, incident response. The agent drafts policies aligned with what the team actually does — extracted from the repo and observable processes — rather than generic templates. Policies are versioned alongside the code and regenerated when underlying practices change.

Implementation Architecture

Designed for
your infrastructure.

Components

  • Ingestion layer: connectors to Git (GitHub/GitLab/Bitbucket/Azure DevOps), package registries, NVD/OSV/GHSA feeds, and the existing CI pipeline.
  • Orchestrator: principal agent with explicit planning, virtual filesystem for intermediate artifacts, and delegation to sub-agents.
  • Specialized sub-agents: SBOM generator, vulnerability analyst, control mapper, document writer.
  • Tool layer (MCP): static analysis, vulnerability database queries, Git operations, document generation.
  • Storage: SBOMs and attestations in OCI registry, evidence in a dedicated versioned repo, queryable index for auditing.

Deployment

  • On-premise or in the client's VPC. Code never leaves the perimeter.
  • Model (Claude) accessed via API with ZDR enabled, or via Bedrock/Vertex if the client requires inference to stay within their cloud as well.

Implementation phases

Diagnosis — 1–2 weeks
Stack inventory, target frameworks, evaluation of the current pipeline, success metric definition.
Pilot on critical repos — 3–4 weeks
Agent in shadow mode, output validation against current process, prompt and tooling refinement.
Rollout — 4–8 weeks
Extension to the rest of the portfolio, integration with ticketing systems, handoff to the internal team.
Why Xipe

Production engineering,
not generalist consulting.

15 years building enterprise software for clients in MX, US, and UK. Deep stack in .NET, infrastructure, and multi-agent orchestration (Semantic Kernel, MCP, custom systems).

We are not a generalist AI consultancy — we are engineers who have spent years in production systems and built these tools because we needed them ourselves first.

  • Every implementation is code the client can inspect and maintain.
  • No opaque lock-in. No third-party SaaS dependencies you don't control.
  • On-premise or VPC deployment. Code never leaves the perimeter.
  • Real-world experience with SOC 2, ISO 27001, PCI-DSS, and HIPAA.
  • Full handoff to the internal team at the end of the engagement.
Technical Diagnosis

30 minutes. No commitment.
Straight answers.

We review your current stack, your target compliance frameworks, and evaluate whether a deep agent implementation makes sense for your case. If your volume does not justify it or your stack is not compatible, we will tell you directly.

An unhandled error has occurred. Reload 🗙