|
Warning
|
DEPRECATED: This workflow is now legacy and deprecated. Please use snyk-sca-plugin instead. This legacy workflow will be retired on September 30th, 2026. |
Use this action to scan repositories for dependency vulnerabilities with the Snyk Open Source Software Composition Analysis (SCA) scanner.
| Input name | Data type | Required? | Description |
|---|---|---|---|
|
String |
Yes |
The Snyk organization name. |
|
String |
Yes |
The Snyk client secret. |
|
String |
No |
The language of your Git repository code base. Refer to the supported languages below. |
| Supported language | Input format |
|---|---|
Go |
|
Java |
|
JavaScript |
|
Ruby |
|
In your YAML file, add:
- name: Scan with Snyk SCA
uses: cloudbees-io/snyk-sca-scan-dependency@v1
with:
orgname: "snyk_organization_name"
token: ${{ secrets.SNYK_SECRET }}
language: "LANGUAGE_GO"This code is made available under the MIT license.
-
Learn more about using actions in CloudBees workflows.
-
Learn about the CloudBees platform.