diff --git a/README.md b/README.md
index e203a3c..ef0c197 100644
--- a/README.md
+++ b/README.md
@@ -1,165 +1,107 @@
-# ⭐ osv-vuln-bot — Always-Green OSV Scanner (Python CLI)
+# 🔎 OSV Vulnerability Bot — Always‑Green Python Project
-A lean, production-grade **Python CLI** to audit dependencies against [OSV.dev](https://osv.dev/).
-It mirrors CI locally, enables **CodeQL**, enforces a **strict always-green** workflow (linear history + required checks), and fails builds when risk thresholds are met.
+Automated vulnerability scanning and CI hardening for Python projects.
+This repo integrates **OSV‑Scanner** against `poetry.lock`, a strict **green CI** (ruff, black, pytest, mypy), and **CodeQL** for security—all guarded by branch protection.
-[](https://github.com/CoderDeltaLAN/osv-vuln-bot/actions/workflows/build.yml)
-[](https://github.com/CoderDeltaLAN/osv-vuln-bot/actions/workflows/codeql.yml)
+[](https://github.com/CoderDeltaLAN/osv-vuln-bot/actions/workflows/ci.yml)
+[](https://github.com/CoderDeltaLAN/osv-vuln-bot/actions/workflows/codeql.yml)
[](https://github.com/CoderDeltaLAN/osv-vuln-bot/releases)

[](LICENSE)
-[](https://www.paypal.com/donate/?hosted_button_id=YVENCBNCZWVPW)
---
-## Repo layout
+## What this project does
-```text
-.
-├── scripts/ # Utilities (e.g., gen_deps_from_poetry.py)
-├── examples/deps.sample.json # Example dependency inventory
-├── src/osv_vuln_bot/ # Python package + CLI
-├── tests/ # pytest (95%+ coverage)
-└── .github/workflows/ # build.yml, codeql.yml, etc.
-```
+- Runs **OSV‑Scanner** on `poetry.lock` to surface known vulnerabilities early.
+- Enforces **always‑green** PRs with required checks: *Analyze*, *python (3.11)*, *python (3.12)*.
+- Uses **CodeQL** for code‑scanning and **Release Drafter** + conventional commits for clean releases.
+- Keeps **linear history** via squash‑merge and branch protection.
---
-## 🚀 Quick Start (Python)
+## Quick start (local)
```bash
-cd /home/user/Proyectos/osv-vuln-bot
-poetry install --no-interaction
-
-# Local gates (mirror CI)
-poetry run ruff check .
-poetry run black --check .
-PYTHONPATH=src poetry run pytest -q
-poetry run mypy src
+# Install tooling (inside your virtualenv)
+python -m pip install -U pip
+pip install ruff black pytest mypy
+
+# Lint/format/tests/types (mirrors CI)
+ruff check .
+black --check .
+PYTHONPATH=src pytest -q
+mypy src
```
-### CLI usage
-
-Generate inventory from `poetry.lock` and scan:
-
+### Local OSV scan
```bash
-cd /home/user/Proyectos/osv-vuln-bot
-poetry run python scripts/gen_deps_from_poetry.py poetry.lock > deps.json
-poetry run osv-vuln-bot --deps deps.json --fail-on high
-```
-
-Help & options:
+# Option A: Using osv-scanner CLI
+python -m pip install osv-scanner
+osv-scanner --lockfile=poetry.lock
-```bash
-cd /home/user/Proyectos/osv-vuln-bot
-poetry run osv-vuln-bot --help
+# Option B: Docker (if you prefer containers)
+docker run --rm -v "$PWD:/work" ghcr.io/google/osv-scanner:latest \
+ --lockfile=/work/poetry.lock
```
-**Notes**
-- `--deps` expects a JSON array of `{ "ecosystem":"PyPI", "name":"", "version":"" }`.
-- `--fail-on` supports: `none | low | moderate | high | critical`.
-- If the threshold is met or exceeded, the process **exits non-zero** (perfect for CI gating).
-
----
-
-## 🧪 Local Developer Workflow (mirrors CI)
-
-```bash
-cd /home/user/Proyectos/osv-vuln-bot
-poetry run ruff check .
-poetry run black --check .
-PYTHONPATH=src poetry run pytest -q
-poetry run mypy src
-```
+> CI runs these gates on PRs and `main`. Branch protection blocks merges if any fail.
---
-## 🔧 CI (GitHub Actions)
+## CI / CD
-- Linux matrix **Python 3.11 / 3.12** with steps matching local gates.
-- **OSV scan** integrated (job fails when the risk threshold is hit).
-- **Artifacts** with per-job logs for troubleshooting.
-- **CodeQL** runs on PRs and `main`.
+- **CI:** `.github/workflows/ci.yml` → Linux, Python 3.11/3.12, ruff/black/pytest/mypy.
+- **Security:** `.github/workflows/codeql.yml` → CodeQL analysis on PRs and `main`.
+- **Releases:** Drafted by Release Drafter; tags via GitHub Releases. Keep commits conventional for good notes.
-Relevant Python job fragment:
+Example Python steps (as in CI):
```yaml
-- run: python -m pip install --upgrade pip
-- run: pip install poetry
-- run: poetry install --no-interaction
-- run: poetry run ruff check .
-- run: poetry run black --check .
-- env:
- PYTHONPATH: src
- run: poetry run pytest -q
-- run: poetry run mypy src
-- name: Generate deps from poetry.lock
- run: poetry run python scripts/gen_deps_from_poetry.py poetry.lock > deps.ci.json
-- name: OSV scan (fail on high)
- run: poetry run osv-vuln-bot --deps deps.ci.json --fail-on high
+- run: python -m pip install -U pip
+- run: pip install ruff black pytest mypy
+- run: ruff check .
+- run: black --check .
+- run: pytest -q
+- run: mypy src
```
---
-## 🗺 When to Use This Project
+## Branch protection (main)
-- You need **security gating** with OSV on PRs and `main`.
-- Python repos that must **stay green** (branch protections + auto-merge).
-- Prefer **linear history** via squash-merge.
+- Required checks: **Analyze**, **python (3.11)**, **python (3.12)**.
+- Linear history, no force‑push, conversations resolved, admins enforced.
+- Squash‑merge only; auto‑merge allowed once checks pass.
---
-## 🧩 Customization
+## Contributing
-- Tune `--fail-on` to match your risk appetite.
-- Swap the inventory source (e.g., generate JSON from `requirements.txt`).
-- Extend the CI matrix or add OS runners if required.
+- Use **small, atomic PRs** and **Conventional Commits** (e.g., `feat: ...`, `fix: ...`, `docs: ...`).
+- Keep local gates green before pushing.
+- Enable **auto‑merge** when checks pass.
---
-## 🛡 Security
+## Security Policy
-- Private disclosures via GitHub Security Advisories.
-- **CodeQL** enabled; OSV runs on every PR and `main`.
-- Secret scanning is enabled; never commit secrets.
+Please report vulnerabilities via **GitHub Security Advisories** (private) or open a minimal reproducible issue if appropriate. CodeQL and OSV scans run automatically on PRs and `main`.
---
-## 🙌 Contributing
+## Sponsorship
-- **Small, atomic PRs** using Conventional Commits.
-- Keep **local gates** green before pushing.
-- Enable **auto-merge** once checks pass.
+If this project is useful, consider supporting continued maintenance and polish. Thank you!
+[**PayPal Donate**](https://www.paypal.com/donate/?hosted_button_id=YVENCBNCZWVPW)
---
-## 📈 SEO Keywords
-
-osv scanner python cli, osv.dev vulnerability audit, poetry lock deps to osv,
-always green ci python, ruff black pytest mypy, github actions matrix, codeql analysis,
-branch protection required checks, squash merge linear history, dependency security gating
-
----
-
-## 👤 Author
-
-**CoderDeltaLAN (Yosvel)**
-Email: `coderdeltalan.cargo784@8alias.com`
-GitHub: https://github.com/CoderDeltaLAN
-
----
-
-## 💚 Donations & Sponsorship
-
-If this project saves you time, consider supporting ongoing maintenance. Thank you!
-[](https://www.paypal.com/donate/?hosted_button_id=YVENCBNCZWVPW)
-
----
+## License
-## 📄 License
+Distributed under the **MIT License**. See [LICENSE](LICENSE).
-Released under the **MIT License**. See [LICENSE](LICENSE).