CI Integration

Integrate CyRook security scans into your CI/CD pipeline. Gate deployments based on security posture.

What is CI Integration?

CI Integration allows you to run CyRook security scans as part of your CI/CD pipeline. You can gate deployments based on security posture, ensuring that only secure code is deployed to production.

Trigger CI Scan

Run a security scan from CI. Results will be available for policy checking.

GitHub Actions Setup

Add CyRook security scans to your GitHub Actions workflow

1. Add Secrets

Add the following secrets to your GitHub repository:

  • CyRook_API_KEY - Your CyRook API key
  • CyRook_TARGET_URL - The URL to scan

2. Add Workflow File

Create .github/workflows/CyRook.yml with:

name: CyRook Security Scan

on:
  push:
    branches: [ main, master ]
  pull_request:
    branches: [ main, master ]

jobs:
  security-scan:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v3
      - name: Run CyRook Security Scan
        uses: CyRook/action@v1
        with:
          target_url: ${{ secrets.CyRook_TARGET_URL }}
          environment: production
          mode: external
        env:
          CyRook_API_KEY: ${{ secrets.CyRook_API_KEY }}

How CI Integration Works

1. Add Workflow

Add the CyRook GitHub Action to your workflow file.

2. Run Scan

The scan runs automatically on every push and pull request.

3. Policy Check

CyRook checks your security posture against configured policies.

4. Gate Deployment

If the scan fails policy checks, the CI pipeline fails and deployment is blocked.