Integrations
Integrate Falcn into your GitHub Actions workflow to scan on every push and pull request.
Basic Setup
Create .github/workflows/security.yml:
name: Supply Chain Security
on:
push:
branches: [main]
pull_request:
branches: [main]
jobs:
falcn-scan:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Falcn Security Scan
uses: falcn-io/falcn-action@v2
with:
asset-criticality: CRITICAL
fail-on-violation: true
Action Inputs
| Input | Description | Default |
|---|---|---|
asset-criticality | Risk multiplier | INTERNAL |
fail-on-violation | Fail workflow on threats | false |
output-format | Output format | sarif |
upload-sarif | Upload to GitHub Security | true |
SARIF Upload
Results appear in the GitHub Security tab:
- name: Falcn Security Scan
uses: falcn-io/falcn-action@v2
with:
output-format: sarif
upload-sarif: true
With Ollama (Self-hosted Runner)
jobs:
falcn-scan:
runs-on: self-hosted
steps:
- uses: actions/checkout@v4
- name: Start Ollama
run: ollama serve &
- name: Falcn Scan with AI
uses: falcn-io/falcn-action@v2
env:
FALCN_LLM_ENABLED: true
FALCN_LLM_PROVIDER: ollama