Hamburger Cross Icon
SBOM Guardrails - Lunar Policy for Security And Compliance

SBOM Guardrails

Policy Stable Security And Compliance

Enforce Software Bill of Materials standards across your organization. Verify SBOMs are generated, contain license data, use approved formats, do not include disallowed licenses, and flag dependencies with blocked geographic origins or disallowed package patterns.

Add sbom to your lunar-config.yml:
uses: github://earthly/lunar-lib/policies/sbom@v1.0.0

Included Guardrails

This policy includes 7 guardrails that enforce standards for your security and compliance.

Guardrail

sbom-exists

Ensures an SBOM was generated, either automatically or detected in CI.

sbom software bill of materials compliance
View Guardrail
Guardrail

has-licenses

Verifies that SBOM components have license information populated. Fails if license coverage is below the configured threshold.

sbom licenses license coverage
View Guardrail
Guardrail

disallowed-licenses

Checks for disallowed licenses in SBOM components. Matches component licenses against configurable regex patterns.

sbom licenses compliance gpl copyleft
View Guardrail
Guardrail

min-components

Verifies the SBOM contains a minimum number of components. Catches trivially empty SBOMs that may indicate detection failures.

sbom completeness components
View Guardrail
Guardrail

standard-format

Validates the SBOM uses an approved format (CycloneDX, SPDX). Auto-passes if no format restriction is configured.

sbom cyclonedx spdx format
View Guardrail
Guardrail

blocked-origins

Checks for dependencies with license origin mentions from blocked countries. Supports blocklist or allowlist mode. Requires the license-origins collector.

sbom license origins country of origin export control compliance supply chain
View Guardrail
Guardrail

disallowed-packages

Checks for disallowed packages by matching PURL, name, or group against configurable regex patterns (e.g. "ru\.yandex\..", "com\.alibaba\..").

sbom disallowed packages package blocklist supply chain compliance
View Guardrail

How Guardrails Fit into Lunar

Lunar guardrails define your engineering standards as code. They evaluate data collected by integrations and produce pass/fail checks with actionable feedback.

Policies support gradual enforcement—from silent scoring to blocking PRs or deployments—letting you roll out standards at your own pace without disrupting existing workflows.

Learn How Lunar Works
1
Integrations Gather Data
Collectors extract metadata from code, CI pipelines, tool outputs, and scans
2
{ } Centralized as JSON
All data merged into each component's unified metadata document
3
Guardrails Enforce Standards This Policy
Real-time feedback in PRs and AI workflows

Required Integrations

This policy evaluates data gathered by one or more of the following integration(s). Make sure to enable them in your lunar-config.yml.

Configuration

Configure this policy in your lunar-config.yml.

Inputs

Input Required Default Description
disallowed_licenses Required Regex patterns of disallowed licenses. Accepts a comma-separated string (e.g. "GPL.*,AGPL.*") or a JSON array (e.g. '["GPL.*", "AGPL.*"]').
min_license_coverage Optional 50 Minimum percentage of components that must have license info (0-100)
min_components Optional 1 Minimum number of components the SBOM must contain
allowed_formats Required Comma-separated list of allowed SBOM formats (e.g. "cyclonedx,spdx"). Empty means any.
blocked_countries Required Comma-separated list of blocked countries for license origin checks (e.g. "Russia,China,Iran,North Korea")
disallowed_packages Required Regex patterns for disallowed packages, matched against PURL, name, and group. Accepts a comma-separated string or a JSON array (e.g. '["ru\\.yandex\\..*", "com\\.alibaba\\..*"]').

Documentation

View on GitHub

SBOM Guardrails

Enforces SBOM existence, license compliance, completeness, and format standards.

Overview

This policy enforces Software Bill of Materials standards across your organization. It verifies that SBOMs are generated, contain license data, use approved formats, and do not include disallowed licenses. It works with data from both auto-generated SBOMs (via the syft collector) and CI-detected SBOMs, enabling vendor-agnostic SBOM governance.

Policies

This policy provides the following guardrails (use include to select a subset):

Policy Description Failure Meaning
sbom-exists Checks that an SBOM was generated No SBOM found from any source
has-licenses Verifies components have license info License coverage below threshold
disallowed-licenses Checks for disallowed license patterns Component uses a disallowed license
min-components Verifies minimum component count SBOM has too few components
standard-format Validates SBOM format SBOM uses a non-approved format
blocked-origins Checks for license origin mentions from blocked countries Dependency has country mention from blocklist
disallowed-packages Checks for disallowed packages by PURL/name/group pattern Package matches a disallowed pattern

Required Data

This policy reads from the following Component JSON paths:

Path Type Provided By
.sbom.auto object syft collector (generate sub-collector)
.sbom.cicd object syft collector (ci sub-collector)
.sbom.auto.cyclonedx.components array syft collector
.sbom.cicd.cyclonedx.components array syft collector
.sbom.license_origins.packages array license-origins collector (for blocked-origins check)

Note: Ensure the syft collector is configured before enabling this policy. The blocked-origins check additionally requires the license-origins collector.

Installation

Add to your lunar-config.yml:

policies:
  - uses: github://earthly/lunar-lib/policies/sbom@main
    on: ["domain:engineering"]
    enforcement: block-pr
    # include: [sbom-exists, disallowed-licenses]
    with:
      disallowed_licenses: "GPL.*,BSL.*,AGPL.*"
      min_license_coverage: "90"
      min_components: "1"
      # allowed_formats: "cyclonedx"
      # disallowed_packages: '["alibabacloud", "aliyun-.*", ".*\\.ru$"]'

Tip: disallowed_licenses and disallowed_packages accept either a comma-separated string ("GPL.*,AGPL.*") or a JSON array string ('["GPL.*", "AGPL.*"]'). JSON arrays are recommended when patterns contain commas or complex regex.

Examples

Passing Example

All components have approved licenses and license coverage meets the threshold:

{
  "sbom": {
    "auto": {
      "source": { "tool": "syft", "integration": "code", "version": "1.19.0" },
      "cyclonedx": {
        "bomFormat": "CycloneDX",
        "specVersion": "1.5",
        "components": [
          {
            "name": "github.com/sirupsen/logrus",
            "version": "v1.9.3",
            "licenses": [{ "license": { "id": "MIT" } }]
          }
        ]
      }
    }
  }
}

Failing Example

A component uses a disallowed GPL license:

{
  "sbom": {
    "auto": {
      "cyclonedx": {
        "components": [
          {
            "name": "copyleft-lib",
            "licenses": [{ "license": { "id": "GPL-3.0" } }]
          }
        ]
      }
    }
  }
}

Failure message: "Component 'copyleft-lib' uses disallowed license 'GPL-3.0' (matches pattern 'GPL.*')"

Remediation

When this policy fails, you can resolve it by:

  1. sbom-exists failure: Enable the syft collector or run Syft in your CI pipeline to generate an SBOM
  2. has-licenses failure: Ensure Syft has network access for remote license lookups, or add license metadata to your project dependencies
  3. disallowed-licenses failure: Replace the disallowed dependency with an alternative that uses an approved license, or update the disallowed_licenses input
  4. min-components failure: Verify Syft can detect your project's package manager and dependencies are declared correctly
  5. standard-format failure: Configure Syft to output in an approved format (e.g., cyclonedx-json) or update the allowed_formats input
  6. blocked-origins failure: Review the flagged package's license file to confirm the country mention is genuine (not a false positive), then either replace the dependency or update the blocked_countries/allowed_countries inputs
  7. disallowed-packages failure: Replace the disallowed dependency or update the disallowed_packages regex patterns

Open Source

This policy is open source and available on GitHub. Contribute improvements, report issues, or fork it for your own use.

View Repository

Common Use Cases

Explore how individual guardrails work with specific integrations.

+
Sbom Exists + Syft SBOM Collector Ensures an SBOM was generated, either automatically or detected in CI.
+
Sbom Exists + License Origins Collector Ensures an SBOM was generated, either automatically or detected in CI.
+
Has Licenses + Syft SBOM Collector Verifies that SBOM components have license information populated. Fails if...
+
Has Licenses + License Origins Collector Verifies that SBOM components have license information populated. Fails if...
+
Disallowed Licenses + Syft SBOM Collector Checks for disallowed licenses in SBOM components. Matches component licenses...
+
Disallowed Licenses + License Origins Collector Checks for disallowed licenses in SBOM components. Matches component licenses...
+
Min Components + Syft SBOM Collector Verifies the SBOM contains a minimum number of components. Catches trivially...
+
Min Components + License Origins Collector Verifies the SBOM contains a minimum number of components. Catches trivially...
+
Standard Format + Syft SBOM Collector Validates the SBOM uses an approved format (CycloneDX, SPDX). Auto-passes if no...
+
Standard Format + License Origins Collector Validates the SBOM uses an approved format (CycloneDX, SPDX). Auto-passes if no...
+
Blocked Origins + Syft SBOM Collector Checks for dependencies with license origin mentions from blocked countries....
+
Blocked Origins + License Origins Collector Checks for dependencies with license origin mentions from blocked countries....
+
Disallowed Packages + Syft SBOM Collector Checks for disallowed packages by matching PURL, name, or group against...
+
Disallowed Packages + License Origins Collector Checks for disallowed packages by matching PURL, name, or group against...

Ready to Automate Your Standards?

See how Lunar can turn your engineering wiki, compliance docs, or postmortem action items into automated guardrails with our 100+ built-in guardrails.

Works with any process
check Infrastructure conventions
check Post-mortem action items
check Security & compliance policies
check Testing & quality requirements
Automate Now
Turn any process doc into guardrails
Book a Demo