Safeguard Documentation Center
Enterprise Software Supply Chain Manager (ESSCM)

AI Remediate

Automated vulnerability remediation powered by Griffin AI

AI Remediate

AI Remediate uses Griffin AI to automatically generate and apply security fixes, reducing remediation time from days to minutes.

How AI Remediate Works

  1. Analysis - Griffin AI analyzes the vulnerability and your codebase
  2. Solution Generation - AI determines the safest upgrade path
  3. Impact Assessment - Breaking changes and compatibility checked
  4. PR Creation - Automated Pull Request with all changes
  5. Validation - Automated tests run to verify the fix

AI Remediate Capabilities

Dependency Upgrades

Griffin AI can automatically:

  • Upgrade vulnerable packages to fixed versions
  • Handle transitive dependency conflicts
  • Update lock files appropriately
  • Maintain compatibility with existing code

Configuration Fixes

For configuration-based vulnerabilities:

  • Update security headers
  • Patch insecure defaults
  • Apply recommended settings

Code Modifications

In some cases, Griffin AI can:

  • Replace deprecated function calls
  • Update API usage patterns
  • Apply security patches to code

Using AI Remediate

Single Vulnerability

  1. Navigate to the vulnerability
  2. Click AI Remediate
  3. Review the proposed changes
  4. Click Create Pull Request

Bulk AI Remediate

Fix multiple vulnerabilities at once:

  1. Select vulnerabilities to fix
  2. Click AI Remediate Selected
  3. Griffin AI batches compatible fixes
  4. Review all changes
  5. Create PRs (one per repository)

Page-Level AI Remediate

From the Vulnerabilities page:

  1. Click the AI Remediate button at the top
  2. Griffin AI analyzes all fixable vulnerabilities
  3. Review the comprehensive remediation plan
  4. Approve and create Pull Requests

AI Remediate Settings

Configure AI Remediate behavior in SettingsAI Remediate:

SettingDescription
Auto-Create PRsAutomatically create PRs for safe fixes
Require ApprovalRequire manual approval before PRs
Test IntegrationRun tests before creating PRs
Breaking Change PolicyHow to handle breaking changes
Branch NamingPR branch naming convention

Supported Ecosystems

EcosystemPackage ManagerAI Remediate Support
JavaScriptnpm, yarn, pnpmFull
Pythonpip, poetry, pipenvFull
JavaMaven, GradleFull
GoGo modulesFull
RustCargoFull
RubyBundlerFull
.NETNuGetFull
PHPComposerFull

Breaking Change Detection

Griffin AI analyzes potential breaking changes:

  • Safe - No breaking changes expected
  • Minor - Minor API changes, low risk
  • Major - Significant changes, review recommended
  • Critical - High risk of breaking, manual review required

PR Details

Auto-generated PRs include:

  • Clear title with CVE reference
  • Detailed description of the vulnerability
  • Summary of changes made
  • Breaking change warnings (if any)
  • Test results (if configured)
  • Links to relevant advisories

Best Practices

  • Enable tests - Catch regressions automatically
  • Start with safe fixes - Build confidence gradually
  • Review major changes - Don't auto-merge breaking changes
  • Monitor metrics - Track fix success rate

On this page