## Aura Security's ADR-084 Verification Stage: Sandbox PoC Execution Aims to Eliminate False Positives
Aura's vulnerability scanning pipeline has a critical gap. The verification stage, defined in ADR-084, remains an unimplemented stub, leaving the system unable to automatically confirm if detected vulnerabilities are actually exploitable. The new plan is to bridge this gap by implementing sandbox-based proof-of-concept (PoC) execution, directly integrating a crash oracle to transform raw detection into actionable, verified findings.

The core of the implementation involves connecting existing infrastructure to this new stage. Aura already possesses the building blocks: ECS Fargate for provisioning ephemeral sandbox containers, container escape detection systems from ADR-077, and human-in-the-loop (HITL) approval workflows. The missing link is the `VerificationStage.execute()` function, which must be built to automatically spin up isolated environments for each finding, run the exploit PoC, and use a crash oracle—like the AddressSanitizer model cited from Anthropic's research—to definitively confirm a successful exploit.

This move signals a strategic shift from mere detection to proven exploitability, a key differentiator for effective security triage. By automating verification, the system aims to filter out false positives, providing security teams with higher-confidence alerts. The integration leverages internal capabilities but hinges on successfully orchestrating sandbox provisioning, execution, and crash analysis within the existing ADR-084 pipeline framework.
---
- **Source**: GitHub Issues
- **Sector**: The Lab
- **Tags**: vulnerability_scanner, sandbox, exploit_verification, ADR-084, false_positives
- **Credibility**: unverified
- **Published**: 2026-04-09 21:27:19
- **ID**: 57599
- **URL**: https://whisperx.ai/en/intel/57599