Skip to content

hhhashexe/shieldnet-action

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

1 Commit
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ›‘ ShieldNet Security Scan β€” GitHub Action

Scan your web app, API, or AI agent for security vulnerabilities on every push.

Quick Start

name: Security Scan
on: [push, pull_request]

jobs:
  security:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4
      
      - name: ShieldNet Scan
        uses: hhhashexe/shieldnet-action@v1
        with:
          target: 'https://your-app.com'
        env:
          GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}

Scan Types

URL Scan

- uses: hhhashexe/shieldnet-action@v1
  with:
    target: 'https://your-app.com'

GitHub Repo Scan (auto-detect)

- uses: hhhashexe/shieldnet-action@v1
  # No target = scans current repo

Scan Specific Repo

- uses: hhhashexe/shieldnet-action@v1
  with:
    github-repo: 'owner/repo'
    scan-type: 'github'

Inputs

Input Description Required Default
target URL to scan No β€”
github-repo GitHub repo (owner/repo) No Current repo
scan-type url, code, github, or auto No auto
api-key ShieldNet API key for higher limits No β€”
fail-grade Fail workflow at this grade No F
comment-on-pr Post results as PR comment No true
api-url Custom API URL (self-hosted) No https://scan.bughunt.tech

Outputs

Output Description
grade Security grade (A-F)
score Score (0-100)
findings-count Total findings
critical-count Critical findings
high-count High findings
badge-url Shields.io badge URL

Fail on Grade

- uses: hhhashexe/shieldnet-action@v1
  with:
    target: 'https://your-app.com'
    fail-grade: 'D'  # Fail if grade is D or F

Use Outputs

- name: ShieldNet Scan
  id: scan
  uses: hhhashexe/shieldnet-action@v1
  with:
    target: 'https://your-app.com'

- name: Check Results
  run: |
    echo "Grade: ${{ steps.scan.outputs.grade }}"
    echo "Score: ${{ steps.scan.outputs.score }}"
    if [ "${{ steps.scan.outputs.critical-count }}" != "0" ]; then
      echo "CRITICAL vulnerabilities found!"
      exit 1
    fi

Badge

Add to your README:

![Security](https://scan.bughunt.tech/badge/your-app.com)

API Key

For higher rate limits, get a free API key:

curl -X POST https://scan.bughunt.tech/auth/register \
  -H "Content-Type: application/json" \
  -d '{"email":"you@example.com"}'

Then add as GitHub secret (SHIELDNET_API_KEY) and use:

- uses: hhhashexe/shieldnet-action@v1
  with:
    target: 'https://your-app.com'
    api-key: ${{ secrets.SHIELDNET_API_KEY }}

License

MIT

About

πŸ›‘ GitHub Action for ShieldNet security scanning β€” scan on every push, get A-F grade, PR comments, fail on bad grade

Resources

Stars

Watchers

Forks

Packages

 
 
 

Contributors