Makaʻala Shield is a modular security analysis platform that automates vulnerability detection across software repositories. Originally scoped for a five-person team, the project was completed by just two developers — requiring us to take on the full backend, database architecture, scanner integration, enrichment pipeline, SBOM generation, and frontend dashboard ourselves.
The platform aggregates results from multiple open-source security scanners, normalizes them into a unified format, enriches findings against public vulnerability catalogs, and presents everything through a filterable, sortable web dashboard.
Backend: Python with FastAPI
Frontend: React (JavaScript)
Database: PostgreSQL
Containerization: Docker
Scanning Tools: Trivy, Bandit, Grype
SBOM & Validation: Syft, CycloneDX-CLI
Vulnerability Enrichment: OSV, CVSS, KEV, EPSS
A central focus of my work was designing the relational database that ties the platform together. The PostgreSQL schema tracks the full lifecycle of a security scan — from user authentication through to enriched vulnerability results.
Key entities:

As Backend & Database Lead on a project designed for five, I owned the FastAPI server, PostgreSQL schema, scanner orchestration, and enrichment pipeline. My partner handled the React frontend while we collaborated closely on the API layer between the two.
Working at this scope as a two-person team required constant prioritization. LLM-powered explanations and automated CI/CD scan templates were cut to keep the core system — scanners, enrichment, SBOM, and dashboard — fully integrated and functional. Designing a database schema that cleanly represented multiple scanners and enrichment sources was one of the most technically demanding parts of the project, and reinforced how much upstream data modeling shapes everything built on top of it.