Seamlessly integrate Spyda into your repository lifecycle. From PR checks to Dependency Graph.
name: Spyda Security Scan
on: [push, pull_request]
jobs:
spyda-analysis:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: actions/cache@v4
with:
path: .spyda/cache
key: spyda-${{ runner.os }}-${{ hashFiles('**/lock.json') }}
- uses: spyda-sec/action@v2
with:
api-key: ${{ secrets.SPYDA_API_KEY }}
fail-on-threshold: true
threshold: 80Results uploaded via SARIF to GitHub's native Security tab.
Blocks merges if TrustScore < 80. Inline code annotations.
Deep traversal + GitHub maintainer health stats.
Auto-opens issues for critical drops. Comments remediation fix.
Spyda correlates CodeQL and Secret Scanning results with confidence-weighted scoring to reduce false positives.