Log in to your harness - The Modern Software Delivery Platform® account to give feedback

Feature Requests

Anonymous

Feature Requests for Harness. Select 'Category' based on the module you are requesting the feature for.
Expose Vulnerability Age Data to OPA for Time-Based Policy Enforcement
User Story: As a Security Engineer, I want to create and enforce policies based on the age of a vulnerability, so that I can automatically fail builds that violate our internal Service Level Agreements (SLAs) for remediation. Problem Statement / Business Justification: During a recent customer Proof of Value, their security team lead explained a critical part of their current governance process: they allow a specific "grace period" for developers to fix vulnerabilities based on severity (e.g., 5-10 days for a 'Critical'). After that period expires, any build containing that vulnerability is automatically failed. Currently, while Harness STO can identify the age of an active issue, this data is not exposed to the Open Policy Agent (OPA) engine. This prevents customers from automating this common and critical security SLA enforcement directly within Harness, forcing them to rely on manual tracking or external tooling. Adding this capability would significantly increase the value of our governance features and align the platform with mature enterprise security practices. Proposed Solution / Acceptance Criteria: The "age" of a vulnerability (i.e., the duration since it was first detected for a given target) needs to be made available as an attribute within the OPA input document during pipeline execution. AC 1: The STO data model available to OPA must include a field representing the vulnerability's age (e.g., age_in_days or a first_seen_timestamp). AC 2: A user can successfully write, save, and apply a REGO policy that references this new age attribute. AC 3: The pipeline correctly fails or passes based on the time-based policy. For example, a policy like deny if vulnerability.severity == 'Critical' && vulnerability.age_in_days > 10 must be enforceable.
1
·

under review

Load More