Links
Comment on page

Introduction to Git repositories integrations

You can use Snyk functions to secure your application code, using Snyk Code for your own code and Snyk Open Source for the open-source libraries you use.
Snyk functions to secure application code
Snyk functions to secure application code
These functions are available at each point in the development process to test, fix, and monitor your code, as explained in the following sections.
For additional introductory information about Git integrations, see the other articles in this section of the documentation and Clone an integration across your Snyk Organizations in the Snyk Broker documentation.

While developing

Developers can use Snyk to check for issues while writing code locally on their machines before any code changes are pushed to the central Git repository.
Developers can test, fix, and monitor using:

At code merge

When developers merge their code changes into their Git repository, Snyk can:
  • Run PR Checks: scan for issues when a pull request (PR) is merged. By default, PR Checks act to ensure that the attack surface of the application never increases, only failing when a PR adds a dependency with issues.
  • Run daily scans: have Snyk, by default, run daily scans if you imported Snyk Projects from your repo, to find any new problems in your current libraries quickly, such as critical zero-day vulnerabilities. This scanning occurs for all imported Projects, whether or not your teams are currently working on them. See Walkthrough: code repository Projects.
  • Create Jira tickets: manage work on new issues discovered, to assign this work to developers in your team, and track progress on these issues. See the Jira integration documentation.

Automatically fix

Snyk can also suggest fixes by creating a PR to address a vulnerability, address older dependencies, and help address backlogged vulnerabilities over time. See Fix your first vulnerability.

During build

Snyk can again act as a “gate” when you are building the application, checking that the code is secure at this stage by checking for issues automatically as part of the build process. This prevents a build from being completed based on policies as needed.
You can choose to report on issues, allowing the build to happen, or to stop the build if issues are encountered. You can also easily add criteria to this process, including exploitability, CVSS score, and whether a fix exists, thus focusing on fixing the issues that matter to you.
Snyk provides a number of Snyk tools to help with this process.

Security gate and Deploy

After passing through these points and the security gate, applications and code can be deployed to production: traditional and PaaS, Serverless, and Registry. You can get alerts or create Jira tickets when a new vulnerability is discovered and use Snyk's monitor function and other capabilities to maintain security.