CI/CD Integrations
Azure DevOps Server Setup for Local Code Scanning
Use the CybeDefend CLI to integrate local scans into an on-prem Azure DevOps Server pipeline.
Run CybeDefend scans in your on-prem Azure DevOps Server pipeline, maintaining code on your own infrastructure while benefiting from automated security checks.
Prerequisites
- API Key: Create one in your CybeDefend profile.
- Agent Permissions: Ensure your self-hosted agent can install or run the CybeDefend CLI.
- Azure DevOps Access: Sufficient rights to modify your pipeline definition.
Make sure the agent’s OS matches one of our supported CLI binaries (Windows, Linux, or macOS).
Example azure-pipelines.yml
Explanation
- checkout: self
Ensures your code is present on the build agent. - Download & Install
Grabs the CLI binary, grants permissions, and moves it to/usr/local/bin
. - Run the Scan
The--ci
flag keeps the output minimal. We rely on environment variables for the API key and project ID.
Viewing Scan Results
- CLI Output
The console output shows a summary of detected issues. - CLI “results”
If you want more detail in the pipeline logs, add a step: - CybeDefend Dashboard
Login to your CybeDefend account to see a full vulnerability breakdown.
Large repos can take extra time to upload. Ensure your pipeline has enough timeout for the scan process.
For advanced gating, fail the job if a certain severity is found. Combine —ci with parsing the CLI exit codes or vulnerability count from the JSON output.