How it works
Drako uses AST-based static analysis to parse your Python (and optionally TypeScript/JavaScript) source code into an abstract syntax tree, then evaluates 97 deterministic rules against it. There is no LLM in the evaluation loop. The analysis runs in your local process — no network calls, no cloud dependency, no data leaving your machine. When you rundrako scan ., Drako:
- Discovers all agent source files and configuration.
- Generates an Agent BOM — a full inventory of agents, tools, models, and permissions.
- Evaluates all 97 rules against the parsed AST.
- Performs reachability analysis to separate actively used tools from unreferenced ones.
- Calculates two governance scores and renders the findings report.
Running a scan
The simplest invocation scans the current directory:- Local development
- CI pipeline
- Pull request diff
Understanding the output
A typical scan produces output like this:Two scores, two audiences
Governance speaks to security teams: are your agents safe? It reflects how well the project controls what agents can do, what they have access to, and whether there are audit trails and human oversight mechanisms. Determinism speaks to engineers: will your agents behave the same way twice? It reflects whether agents are configured for reproducible outputs — temperature, seeds, timeouts, iteration limits. Both scores use the same grading scale:| Grade | Score range | What it means |
|---|---|---|
| A | 90–100 | Strong governance posture |
| B | 75–89 | Minor gaps, low risk |
| C | 60–74 | Moderate risk, address soon |
| D | 40–59 | Significant gaps, prioritize remediation |
| F | 0–39 | Critical issues present |
Severity levels
Each finding is assigned one of four severity levels:| Severity | Points deducted | Cap |
|---|---|---|
| CRITICAL | −15 per finding | −60 total |
| HIGH | −8 per finding | −40 total |
| MEDIUM | −3 per finding | −20 total |
| LOW | −1 per finding | −10 total |
Next steps
Scan rules
Browse all 97 deterministic rules across 16 categories — security, governance, compliance, and more.
Reachability analysis
Learn how Drako uses AST traversal to separate real risks from theoretical ones.