GitHub Actions

Last updated: Apr 24, 2026


Fluid Attacks provides dedicated GitHub Actions for automated security testing directly in your CI/CD pipeline. Each action is free to use, requires no API key or account, and integrates with GitHub's native Code Scanning feature.

ActionScannerDescription
SASTStatic Application Security TestingDetects vulnerabilities in your source code
SCASoftware Composition AnalysisDetects known CVEs in your dependencies
Secret ScanSecrets DetectionDetects hardcoded credentials and secrets

How it works

All three actions share the same core workflow structure: a checkout step, the scanner action, and an optional SARIF upload to GitHub's Security tab.

Each action automatically switches between full scan and differential scan modes depending on the Git event that triggered the workflow:

  • Push to the default branch → full scan of all configured paths.
  • Push to a feature branch or pull request → differential scan of only the changed files.

Differential mode keeps CI fast and ensures new vulnerabilities are caught before they reach the default branch.

What it looks like in GitHub

Job steps

After a push or pull request, the workflow appears in the Actions tab with the individual steps: checkout, scan, and upload.

GitHub Actions job steps for the SCA workflow in machine_flow

Scanner logs

Expanding the scan step shows the scanner output: which files or dependency manifests were found, what vulnerabilities were detected, and whether the run was a full or differential scan.

Scanner log output in the SCA GitHub Actions step

Security tab results

Once the SARIF file is uploaded, findings appear in the repository's Security → Code scanning panel with severity, file location, and a description of each vulnerability.

GitHub Security tab showing SCA findings from machine_flow

Privacy: The actions collect only anonymized programming language metadata for analytics. Source code and scan results never leave your runner. See the EULA for details.

On this page