Snyk User Documentation


  1. 1.
    After signing up, connect to your project.
  2. 2.
    Run tests against your project.
  3. 3.
    Review vulnerability results.
  4. 4.
    Correct vulnerabilities via Pull Requests.
  5. 5.
    Remain secure with monitoring.
For details of Snyk data handling, see How Snyk handles your data.
Last modified 27d ago
Export as PDF
Copy link
Edit on GitHub