Skip to content

venkatapgummadi/ascend

ASCEND

Automated Scanning, Compliance ENforcement, and Deployment

A four-layer DevSecOps framework that integrates automated security scanning directly into CI/CD pipelines with build-gating mechanisms, multi-track deployment orchestration, and AI-powered post-deployment code synchronization.

CI License: MIT Python 3.9+ Paper GitHub stars Last commit PRs welcome


Overview

Modern CI/CD pipelines prioritize velocity. ASCEND's thesis is that velocity and security are not in tension — the tension comes from treating security scanning as a passive reporting step rather than as an active build gate. ASCEND integrates security scanning, build gating, multi-track deployment orchestration, and AI-powered synchronization into a single, platform-agnostic framework.

Four-Layer Architecture

┌─────────────────────────────────────────────────────────────────┐
│  Layer 1: Source Analysis                                        │
│  SAST (CodeQL, Semgrep, SonarQube) + SCA (Snyk) + Secrets       │
│                           [ Quality Gate 1 ]                     │
├─────────────────────────────────────────────────────────────────┤
│  Layer 2: Build & Integration                                    │
│  Container Scan (Trivy) + IaC Scan (Checkov) + License Check    │
│                           [ Quality Gate 2 ]                     │
├─────────────────────────────────────────────────────────────────┤
│  Layer 3: Deployment Orchestration                               │
│  Blue-Green / Canary / Rolling + DAST (OWASP ZAP)               │
│                           [ Quality Gate 3 ]                     │
├─────────────────────────────────────────────────────────────────┤
│  Layer 4: AI-Powered Synchronization                             │
│  AST Drift Detection + ML Conflict Classification + LLM Resolve  │
│                      [ Back-propagation ]                        │
└─────────────────────────────────────────────────────────────────┘

Key Contributions

  1. Four-layer DevSecOps architecture with formal quality gate definitions.
  2. Platform reference configurations for GitHub Actions, GitLab CI/CD, Jenkins, and Azure DevOps.
  3. Multi-track deployment framework supporting blue-green, canary, and rolling strategies with automated quality gates at each promotion boundary.
  4. AI-powered synchronization system using AST differencing, ML conflict classification, and LLM-based resolution with property-based verification.
  5. Comprehensive scanning tool integration covering SonarQube, Semgrep, CodeQL, Snyk, Trivy, OWASP ZAP, Checkov, and TruffleHog.

Quick Start

1. Choose your platform

ASCEND provides full reference configurations for four major CI/CD platforms:

Platform Location Best For
GitHub Actions platforms/github-actions/ Teams on GitHub with GHAS
GitLab CI/CD platforms/gitlab-ci/ Fastest integration via native templates
Jenkins platforms/jenkins/ Existing Jenkins infrastructure
Azure DevOps platforms/azure-devops/ Microsoft enterprise ecosystems

2. Copy the pipeline configuration

Example for GitHub Actions:

cp platforms/github-actions/.github/workflows/ascend-full.yml \
   /path/to/your/repo/.github/workflows/

3. Configure scanning tools

Each scanning tool requires minimal configuration (API tokens, organization IDs). See quality-gates/README.md for setup instructions for each tool.

4. Enable the AI synchronization layer (optional)

cd ai-sync
pip install -e .
ascend-sync --help

See ai-sync/README.md for configuration.

5. Run your first pipeline

Push a commit to your feature branch. ASCEND will execute Layer 1 scanning immediately. Passing builds progress through Layer 2, Layer 3, and Layer 4 according to your promotion rules.


Reproducing the paper's results

The IEEE Access submission (docs/paper/) makes specific empirical claims (83.0% critical-vuln reduction, 43.5% MTTD improvement, 94.2% AI conflict-resolution accuracy, all at p < 0.001 with d > 2.0). The reproduction harness lives in evaluation/ and is wired into the root Makefile.

# Full reproduction pass (install, test, lint, eval, stats)
make repro

# Or step-by-step:
make install    # editable install + dev extras
make test       # pytest (25 tests)
make lint       # ruff
make eval       # conflict-fixtures benchmark, asserts heuristic baseline
make stats      # Welch t-test + Cohen's d on aggregate-metrics.csv

The make eval target asserts the heuristic conflict classifier still achieves a 71% baseline on the bundled fixtures. The make stats target runs the analysis pipeline against a synthetic schema-demonstration CSV; reproducing the paper's actual Table IX numbers requires the NDA-protected per-repository telemetry as documented in evaluation/README.md and docs/paper/EVALUATION.md.

For the full reviewer-facing reproducibility paper trail, see docs/paper/REVIEWER_CHECKLIST.md.


Adoption Roadmap

ASCEND is designed for incremental adoption. Most organizations realize the majority of security value from Layer 1 alone.

Phase Effort Layers Outcome
Phase 1 1–2 weeks Layer 1 ~80% of vulnerability reduction
Phase 2 4–6 weeks Layers 1–2 Container & IaC coverage
Phase 3 4–6 weeks Layers 1–3 Multi-track deployment gates
Phase 4 8–12 weeks Layers 1–4 Full AI synchronization

Start with Phase 1, measure impact, and progress only when the current phase is operating smoothly.


Repository Structure

ASCEND/
├── docs/                    # Architecture docs and research paper
│   ├── architecture.md
│   ├── quality-gates.md
│   ├── adoption-guide.md
│   └── paper/               # Research paper sources and metadata
├── platforms/               # Platform-specific CI/CD configurations
│   ├── github-actions/
│   ├── gitlab-ci/
│   ├── jenkins/
│   └── azure-devops/
├── ai-sync/                 # AI synchronization Python module
│   ├── ascend_sync/         # Source package
│   ├── tests/
│   └── examples/
├── quality-gates/           # Scanning tool configurations
│   ├── sonarqube-quality-gate.json
│   ├── semgrep-rules.yml
│   ├── checkov-config.yml
│   ├── zap-rules.tsv
│   └── trufflehog-config.yml
├── examples/                # Sample applications with ASCEND integrated
└── scripts/                 # Setup and validation utilities

Documentation

Getting started

Reference

Enterprise and compliance

Project information

Examples

Working sample applications with ASCEND pre-integrated — see examples/ for details.


Research Paper

ASCEND is described in detail in the accompanying research paper. The paper presents the formal quality gate definitions, the AI synchronization algorithms, and an empirical evaluation of framework effectiveness.

Citation:

@misc{gummadi2026ascend,
  title  = {ASCEND: A Comprehensive DevSecOps Framework for Automated Code Scanning,
            Multi-Track Deployment, and AI-Powered Post-Deployment Synchronization
            in Enterprise CI/CD},
  author = {Gummadi, Venkata Pavan Kumar},
  year   = {2026},
  note   = {Preprint; manuscript under review at IEEE Access}
}

See CITATION.cff for additional citation formats.


Contributing

Contributions are welcome. Please read CONTRIBUTING.md for the contribution workflow and CODE_OF_CONDUCT.md for community standards.

Areas where contributions are especially valuable:

  • Additional platform configurations (CircleCI, TeamCity, Bamboo, Buildkite)
  • Additional scanning tool integrations
  • Conflict resolution model training data (anonymized merge conflict histories)
  • Language-specific SAST rule sets
  • Sample application integrations

License

ASCEND is released under the MIT License. See LICENSE for the full license text.


Author

Venkata Pavan Kumar Gummadi IEEE Senior Member | Professional Software Engineer Email: venkata.p.gummadi@ieee.org


Acknowledgments

The ASCEND framework draws on the public DevSecOps knowledge base assembled by the broader security engineering community, including the NIST Cybersecurity Framework (CSF 2.0), the NIST Secure Software Development Framework (SSDF, SP 800-218), CIS Benchmarks, and the authors of the scanning tools integrated into this framework.

About

DevSecOps for the AI-era CI/CD pipeline. Catches the bugs your AI coding assistant introduces — before they reach production.

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Packages

 
 
 

Contributors