CI/CD INTEGRATION

Automate security scanning in your deployment pipeline. Catch vulnerabilities before they reach production.

GITHUB ACTIONS

Coming Soon

Add a security gate to your CI pipeline with a single workflow file. The action scans your deployed URL and fails the build if the security score is below your threshold.

Basic Setup

Add your WARDEK_API_KEY to your repository secrets, then create the workflow file:

.github/workflows/security.yml
name: Security Scan
on: [push]

jobs:
  wardek-scan:
    runs-on: ubuntu-latest
    steps:
      - name: Deploy Preview
        id: deploy
        uses: your-deploy-action@v1

      - name: WarDek Security Scan
        uses: wardek/scan-action@v1
        with:
          url: ${{ steps.deploy.outputs.url }}
          api-key: ${{ secrets.WARDEK_API_KEY }}
          min-score: 75

Advanced: SARIF + PR blocking

.github/workflows/security-gate.yml
name: Security Gate
on:
  pull_request:
    branches: [main]

jobs:
  security-scan:
    runs-on: ubuntu-latest
    steps:
      - name: Deploy Preview
        id: deploy
        uses: your-deploy-action@v1

      - name: WarDek Security Scan
        uses: wardek/scan-action@v1
        with:
          url: ${{ steps.deploy.outputs.url }}
          api-key: ${{ secrets.WARDEK_API_KEY }}
          min-score: 80
          fail-on-critical: true
          timeout: 120000
          format: sarif

      - name: Upload SARIF
        if: always()
        uses: github/codeql-action/upload-sarif@v3
        with:
          sarif_file: wardek-results.sarif
SARIF output integrates with GitHub Code Scanning. Findings appear directly in the Security tab and as PR annotations.ENTERPRISE

ALTERNATIVE: NPX IN CI

If you prefer not to use the GitHub Action, you can run npx wardek directly:

.github/workflows/wardek-npx.yml
name: Security Scan (npx)
on: [push]

jobs:
  wardek:
    runs-on: ubuntu-latest
    steps:
      - name: Run WarDek Scan
        env:
          WARDEK_API_KEY: ${{ secrets.WARDEK_API_KEY }}
        run: npx wardek scan ${{ env.DEPLOY_URL }} --min-score 75 --fail-on-critical

CONFIGURATION

InputTypeRequiredDescription
urlstringYesTarget URL to scan
api-keystringYesWarDek API key
min-scorenumberNoMinimum acceptable score (0-100)
fail-on-criticalbooleanNoFail job on critical findings
timeoutnumberNoScan timeout in ms
formatstringNoOutput format: text, json, sarif

STATUS BADGE

Coming Soon

Display your security score in your README or documentation. The badge updates automatically after each scan.

Markdown

![WarDek Security Score](https://wardek.io/api/badge/your-site-id)

HTML

<a href="https://wardek.io">
  <img src="https://wardek.io/api/badge/your-site-id"
       alt="WarDek Security Score" />
</a>

Preview

wardek87/100

ENTERPRISE FEATURES

ENTERPRISE

Enterprise plans include additional CI/CD capabilities:

  • SARIF output for GitHub Code Scanning integration
  • Custom webhook notifications on scan completion
  • Parallel scanning across multiple environments
  • Priority scan queue with guaranteed SLA
  • Dedicated support for pipeline configuration