Roadmap

Product roadmap for SeeBOM — phased delivery from foundation to enterprise-grade supply chain security.

Vision

SeeBOM is transitioning from a single-instance SBOM visualization tool into an enterprise-grade, multi-cluster Software Supply Chain Security platform. The roadmap spans three phases (Q1–Q3 2026), each building on the previous:

  1. Foundation & Security — authentication, multi-cluster model, production readiness
  2. Multi-Cluster & Push Model — fleet operations, CI/CD integration, attestation verification
  3. Analytics & Compliance — CRA scoring, exploit prediction, dependency health metrics

Phase 1: Foundation & Security

Q1 2026 (Apr–Jun) · Theme: Make SeeBOM production-ready with real security requirements.

StatusIssueDescription
🔲#131 — Cluster-aware data modelAdd cluster_id to all tables. Every multi-cluster feature depends on this.
🔲#134 — API AuthenticationService token + API key modes. Gate for all write operations.
🔲#137 — Enhanced health checks/readyz, /livez with dependency verification for K8s probes.
🔲#136 — Enhanced CORSSupport POST + custom headers for upload and cross-origin access.
🔲#139 — Headless modeAPI-only deployment without Angular UI (Helm toggle).
🔲#8 — Project List ViewGroup SBOMs by project — foundational UX improvement.
🔲#144 — SBOM DownloadDownload original SBOM JSON from the platform.
🔲#59 — Expose API externallyHelm Ingress template for secure external access.
🔲#55 — CycloneDX SupportParse CycloneDX 1.4+ SBOMs (doubles addressable market).
#37 — Version Skew DetectionCross-org dependency consistency. Merged 2026-05-04.

Exit criteria: SeeBOM deployable with authentication, multi-cluster tagging, proper K8s probes, and CycloneDX parsing.


Phase 2: Multi-Cluster & Push Model

Q2 2026 (Jul–Sep) · Theme: Enable fleet-scale operations — multiple clusters, push ingestion, attestation verification.

StatusIssueDescription
🔲#132 — Cluster listing endpointFirst consumer-visible multi-cluster feature.
🔲#133 — Cluster-detail endpointsPer-cluster deep-links for frontend routing.
🔲#135 — SBOM Upload (Push Model)Accept SBOMs from CI/CD pipelines via POST API.
🔲#138 — Namespace filteringSub-cluster granularity for enterprise teams.
🔲#140 — Workload vulnerability summaryImage → posture cross-reference for compliance dashboards.
🔲#62 — Exportable Auditor ReportsPDF/CSV compliance exports for CRA audits.
🔲#60 — Local OSV MirrorClone osv.dev into ClickHouse — offline, no rate limits.
🔲#57 — Per-project license policiesScoped compliance rules for different product lines.
🔲#143 — In-toto Witness IntegrationSupply chain attestation verification + provenance display.
🔲#58 — Aggregated SBOM ViewGroup version history under project names.

Exit criteria: Multi-cluster management with namespace isolation, SBOM push from CI/CD, PDF compliance reports, attestation verification, no external OSV dependency.


🎯 v1.0.0 Milestone

Target: October 2026 · GitHub Milestone →

After Phase 2 completes, SeeBOM reaches v1.0.0 — the first stable release. From this point forward, the Support Policy (current − 2) takes effect and breaking changes require a major version bump.

v1.0 Criteria

RequirementStatusIssue
API Authentication (service token + API key)🔲#134
Cluster-aware data model (schema stable)🔲#131
Cluster listing + detail endpoints🔲#132, #133
Namespace filtering🔲#138
SBOM Upload endpoint🔲#135
CycloneDX parsing🔲#55
Enhanced health probes🔲#137
Versioned documentation🔲#145
Version Skew Detection#37

What v1.0 means

  • API contract frozen — no endpoint removals or response shape changes without v2.0
  • ClickHouse schema stable — no ORDER BY or column type changes without migration tooling
  • Helm values stable — existing values.yaml keys won’t be renamed
  • Support policy active — current release + 2 previous minors receive security patches
  • SemVer enforced — features in minor bumps, fixes in patches, breaking = major

Pre-1.0 releases

All v0.x releases are development milestones. They may contain breaking changes between any minor version. Do not assume backward compatibility.


Phase 3: Analytics & Compliance

Q3 2026 (Oct–Dec) · Theme: Advanced analytics, regulatory compliance scoring, and supply chain intelligence.

StatusIssueDescription
🔲#141 — CRA Compliance DashboardEU Cyber Resilience Act readiness scoring.
🔲#38 — SBOM DiffDependency tree divergence between versions.
🔲#56 — Dependency Tree ViewHierarchical visualization of transitive chains.
🔲#63 — Blast Radius SearchVersion-constrained impact analysis with vuln context.
🔲#64 — EPSS ScoresExploit probability scoring for prioritization.
🔲#61 — OpenSSF ScorecardUpstream project health scoring per dependency.
🔲#82 — Lottery FactorSingle-maintainer risk detection.
🔲#7 — CVE Fix Time (MTTR)Mean-time-to-remediate tracking per project.

Exit criteria: CRA readiness scoring, EPSS-based prioritization, dependency health metrics, and SBOM diff.


Dependency Graph

The following diagram shows blocking dependencies between issues:

#131 (Cluster Model) ─────┬── #132 (Cluster Listing)
                          ├── #133 (Cluster Detail)
                          ├── #138 (Namespace) ── #140 (Workload Summary) ── #141 (CRA)
                          └── #135 (Upload)
#134 (Auth) ──────────────────────────┘
#136 (CORS) ──────────────────────────┘

#143 (Witness) ── standalone (feeds into #141 CRA Dashboard)
#55 (CycloneDX) ── standalone
#144 (SBOM Download) ── standalone
#137 (Health Checks) ── standalone
#139 (Headless Mode) ── standalone
#60 (OSV Mirror) ── standalone
#64 (EPSS) ── standalone (extends cve-refresher)
#82 (Lottery Factor) ── extends internal/github
#61 (Scorecard) ── extends internal/github

Key insight: #131 (Cluster Model) and #134 (Auth) are the critical-path items — most Phase 2 features depend on them.


Success Metrics

PhaseMetricTarget
Phase 1Production deployment with authService token + API key working, health probes passing
Phase 2CI/CD push integrationUpload endpoint processes 100 SBOMs/hour
Phase 3CRA compliance readinessAll 5 CRA conditions evaluable, score >80%

Prioritization Philosophy

Multi-cluster before analytics

Organizations evaluating SeeBOM for production ask “Can it handle our 5 clusters?” before “Does it have EPSS scores?”

Auth before upload

A write endpoint without authentication is a security incident. Auth gates all write operations.

CRA compliance in Q3

EU CRA enforcement begins 2027. Landing scoring by end of 2026 gives adopters a full year of runway.

Data enrichment as a batch

EPSS, Scorecard, and Lottery Factor share the same architecture pattern (fetch → store → expose → display). Implementing them together maximizes code reuse.


Non-Goals

These items are explicitly out of scope for this roadmap:

  • ❌ Custom Kubernetes Operator (we use Helm + ClickHouse Operator)
  • ❌ Write APIs for license exceptions (frontend is public)
  • ❌ Multi-repo split (monorepo is a hard constraint)
  • ❌ Real-time streaming (batch ingestion is sufficient)
  • ❌ RBAC/multi-tenancy (auth is binary for now)
  • ❌ Full OIDC in SeeBOM (upstream proxy responsibility)

Contributing

Want to pick up an issue from the roadmap? Check the Project Board for items in the Todo column. Issues labeled help wanted are especially good for new contributors.

See Development Guide for setup instructions.