Prerequisites
- Personal Access Token (PAT): Create and store it in your repository’s Settings → Secrets → Actions (e.g.,
CYBEDEFEND_PAT). - Project ID: You should also store your CybeDefend Project ID as a secret (e.g.,
CYBEDEFEND_PROJECT_ID).
The
api_key input is deprecated. Use token with a Personal Access Token (PAT) instead.Using the CybeDefend Action
The CybeDefend Action runs security scans easily in your CI/CD pipelines using the official CybeDefend CLI, powered by Docker (ghcr.io/cybedefend/cybedefend-cli:latest).
Inputs
| Name | Description | Required | Default |
|---|---|---|---|
token | Personal Access Token (PAT) | ✅ | |
project_id | Project ID for the scan | ✅ |
Example Workflow: .github/workflows/cybedefend-scan.yml
Add the following steps to your workflow file:
Checking Your Results
- Action Logs: The job logs in GitHub Actions show a brief summary of vulnerabilities discovered during the scan.
- CybeDefend Dashboard: Log in to your CybeDefend account to view full vulnerability details, manage issues, and track historical scan data for your project.