CascadeGuard — MVP Technical Approach

MVP: Public Secure Images

The first product is a small set of public, hardened container base images maintained by CascadeGuard. Continuously scanned, automatically rebuilt on vulnerability detection, published with full transparency.

This is not a multi-tenant SaaS or subscription product yet. It demonstrates our capability, builds trust, and establishes the platform infrastructure we’ll later open to users.

See mvp-secure-images.md for the full technical approach, data model, API design, and implementation plan.

Finalized Decisions

DecisionChoiceADR
Hosting + APICloudflare Workers (Python), Pages, R2, Turso, KVADR-001
AuthClerk (deferred — not needed for MVP public dashboard)ADR-002
ScanningGrype + Trivy in GitHub Actions (our repos)
SBOMSyft in GitHub Actions
Image registryGHCR (free for public images)

What we build (MVP)

  1. Hardened base images — Dockerfiles for Node, Python, Go, Nginx (small set)
  2. CI pipelines — GitHub Actions workflows: scan, SBOM, rebuild
  3. API — Python on Cloudflare Workers: ingest scan results, track vulnerabilities, trigger rebuilds
  4. Public dashboard — React on Cloudflare Pages: image catalog, CVE detail, SBOM viewer, status badges
  5. SLA engine — auto-rebuild when critical/high CVEs exceed thresholds

What we defer

  • User sign-up and enrollment (multi-tenant SaaS)
  • Billing / subscriptions (Stripe)
  • GitLab/Bitbucket CI support
  • Clerk auth integration (no login needed for public dashboard)
  • Kargo/ArgoCD/Flux webhook integrations

Future path: Open-source → SaaS

Once the public images MVP proves the platform works end-to-end, we extend it:

  1. Add Clerk auth → users can sign up
  2. Add image enrollment → users monitor their own images
  3. Add billing → paid tiers for more images and features
  4. Add GitLab/Bitbucket CI templates

The platform infrastructure (API, DB, dashboard) built for the MVP carries forward directly.