Overview
Automated Scans
Trigger security assessments on every deployment.
Pipeline Gates
Block deployments with critical vulnerabilities.
PR Comments
Security findings posted to pull requests.
Reports
Automatic report generation per build.
Quick Start
GitHub Actions
1
Add Secret
Add your API key to GitHub Secrets:Settings → Secrets → Actions → New repository secret
- Name:
INDIE_SECURITY_API_KEY - Value:
is_live_xxxxxxxxxxxxx
2
Create Workflow
Create
.github/workflows/security.yml:3
Configure Settings
Customize the action:
| Option | Description | Default |
|---|---|---|
mode | quick, standard, deep | quick |
fail-on | Severities that fail the build | critical |
wait | Wait for scan completion | true |
timeout | Max wait time (minutes) | 30 |
GitLab CI
Jenkins
CLI Reference
indiesec auth
indiesec auth
indiesec scan
indiesec scan
indiesec report
indiesec report
indiesec check
indiesec check
Configuration File
Create.indiesec.yml in your repository:
Pipeline Gates
Block deployments based on security findings:- Block on Critical
- Block on High+
- Block on Medium+
Best Practices
Staging vs Production
Staging vs Production
- Run
deepscans on staging before production release - Run
quickscans on production for continuous monitoring - Use stricter gates for production deployments
PR Integration
PR Integration
Post findings as PR comments:
Parallel Scanning
Parallel Scanning
Run security scans in parallel with other tests: