Three install surfaces. One policy engine. Every gate decision
answers four questions: What violations exist?Which are new vs pre-existing?What does the policy say to do about each class?Is the deploy blocked, warned, or permitted — and is
the audit record signed?
Clamper does not re-implement the scanners. It
consumes findings from upstream Ariada engines and applies the
policy gate at Layer 5. The same eight-layer architecture
shows up on every site in the family; on this page Layer 5
is highlighted.
L7Governance & dashboardsariada.ai
L6Visualization & commsdraculascan
L5CI/CD compliance gateclamper.ai
L4Remediationreverter.ai
L3Authorship attributionblamer.ai
L2Cross-domain mappingshared core
L1Single-pass DOM iterationariada engine
L0Platform AX tree + axe-coreshared core
Clamper operates at Layer 5 (the gate). Findings flow up from Layers
0–3; gate decisions flow out to Layer 7 (governance) and audit
storage.
Three install surfaces
1. GitHub Action
Two-minute YAML snippet in
.github/workflows/clamper.yml. On every PR, Clamper
scans the changed files, fingerprints findings, queries the
per-branch baseline, evaluates the policy, and posts an inline
review comment per finding plus a summary comment.
Single bundled dist/index.js (no
npm install in customer pipelines)
Free for OSS public repos; private repos count toward the
tier’s monthly build limit
2. Vercel Marketplace App
One-click install from Vercel Marketplace. Each preview deploy
emits a deployment.ready webhook; Clamper scans
the preview URL and posts a Vercel Checks API entry. A failing
check blocks promotion to production when configured.
Targets the Vercel deploy — not the source repo
— so it works for any framework that ships a Vercel
preview
Same policy file (.clamper.yml) as the
GitHub Action
Phase 1 launch surface (along with GitHub Marketplace)
3. CLI Tool
Run locally, in pre-commit, or in any non-GitHub CI pipeline:
Single declarative configuration at the repo root. Validated
against a public JSON Schema. Cascades from an org-level default
down through team, repo, branch, and environment overrides
— child policies can add rules or tighten
thresholds, but cannot relax a parent rule.
Update trigger: a passing build advances
the baseline; a failing build does not — the
baseline is the latest green state of the branch.
Eight compliance domains
MVP ships three domains active by default (a11y, privacy,
security ingest). The remaining domains layer in by tier and
phase.
Domain
Detection engine
Default in MVP?
Web accessibility (WCAG / EAA / EN 301 549)
axe-core 4.11 + Pa11y + custom rules
Yes (primary)
Privacy (GDPR / CCPA / cookie / PII)
Custom regex + DOM heuristics
Yes (configurable)
Security (SAST / OWASP)
Pluggable upstream (Semgrep / CodeQL output)
Yes (read-only ingest)
AI regulatory (EU AI Act Art. 50)
Pluggable
Phase 2
Code quality (lint / complexity)
Pluggable (ESLint / SonarQube output)
Phase 2
API specification (OpenAPI conformance)
Pluggable (Spectral output)
Phase 3
Performance (Core Web Vitals)
Lighthouse
Phase 2
Sustainability (WSG / carbon)
Pluggable (Web Sustainability Guidelines subset)
Phase 3
Hash-chained signed audit record
Every gate decision emits a canonical JSON record (RFC 8785 JCS),
Ed25519-signed, with a SHA-256 hash chain to the previous record:
H_n = SHA-256(H_{n-1} || canonical_record_n)
Tampering with any field invalidates downstream hashes
Required fields cross-walk to EN 301 549 §10/§11
evidence requirements
Retention: 90 days (Free), 1 year (Team), 7 years
(Business), customer-controlled (Enterprise)
Export formats: signed JSON Lines, SARIF 2.1.0 for GitHub
Code Scanning, signed PDF certificate per release
Validation evidence (honest framing)
End-to-end Clamper gate accuracy on production customer
pipelines is pending pilot data. We do not
claim "100% precision on customer codebases" until we publish
a per-customer report. What we have validated to date:
Methodology validated by absence of prior art at
scale. A systematic search across 8.45M US utility
patents, 3.01M arXiv papers, 8.36M DBLP papers, and ~3,700
accessibility-related code repositories returns
zero hits for the intersection of (a) CI/CD
or deployment + (b) accessibility + (c) policy / exemption /
gate / rollback / team-scope. Constituents are not absent
individually; the intersection is.
CPC density evidence. Patent classification
G06F8/77 (release management) since 2020 has 923 patents, of
which only 18 (1.99%) mention accessibility. G06F11/3636
(test orchestration) since 2020 has 2,932 patents, of which
only 9 (2.05%) mention accessibility.
Proof-of-concept plan in flight. Six test
areas covering all six core capabilities of Module B, with
~3,000-7,000 real GitHub Actions workflows + 50-100 commit
pairs + 80-120 policy fixtures. Execution queued.