Snyk User Documentation

What is Snyk?

Snyk is a Developer Security Platform that integrates directly into development tools and automation pipelines, making it easy to find, prioritize, and fix security vulnerabilities in code, dependencies, containers, and infrastructure as code. Backed by industry-leading vulnerability intelligence, and designed by developers for developers, Snyk fits into your development workflow to put security expertise in your toolkit.

What can I do with Snyk?

  • Snyk Open Source: Find and automatically fix open source vulnerabilities.
  • Snyk Code: Find and fix vulnerabilities in your application code in real time.
  • Snyk Container: Find and fix vulnerabilities in container images and Kubernetes workloads.
  • Snyk Infrastructure as Code (IaC): Find and fix misconfigurations in Terraform, CloudFormation, Kubernetes, and Azure templates.

How can I use Snyk?

You can use Snyk with:
  • Snyk Web UI to access browser-based scanning functions, view results and show reports.
  • Snyk CLI to scan applications, containers, and infrastructure as code for security vulnerabilities.
  • Snyk API to tune Snyk’s security automation to your specific workflows--ensuring both a great developer experience and consistent platform governance.
  • Snyk IDEs to use the functionality of Snyk, all in your standard IDEs such as Visual Studio.

What does it cost?

Snyk has several pricing plans available:
  • Free: For individual developers and small teams looking to secure while they build. Limited tests.
  • Team: For dev teams looking to build security into their development process with shared visibility into projects. Unlimited tests.
  • Business: Empower developers across an organization and provide reporting and advanced controls to manage teams and control to shift security left. Unlimited tests.
  • Enterprise: Standardize dev-first security across the enterprise, with centralized policy governance. Unlimited tests.
See Running tests for more details of tests.

Who uses Snyk?

Google, Salesforce, Atlassian, Twilio, Revolut and many more are using Snyk to secure their code and monitor for vulnerabilities.

How do I get started?

  1. 1.
    Sign up and connect to your project.
  2. 2.
    Run tests against your project.
  3. 3.
    Review your results to identify vulnerabilities.
  4. 4.
    Correct these vulnerabilities via Pull Requests.
  5. 5.
    Remain secure with monitoring.
See Getting started for more details.

What happens to my data?

For details of Snyk data handling, see How Snyk handles your data.
Last modified 1d ago