Snyk GitHub Enterprise integration

Feature availability GitHub Enterprise integration is available to Snyk Enterprise plan customers. If you have a Legacy Business plan, contact Snyk support for access. See the Plans and pricing page for details.
If you are a Snyk Enterprise plan customer, Snyk recommends that you use the GitHub Enterprise integration. If you use the self-hosted GitHub Enterprise product, you must use the Snyk GitHub Enterprise integration. See Using GitHub or GitHub Enterprise integration for details.
The Snyk GitHub Enterprise integration lets you:
  • Continuously perform security scanning across all integrated repositories.
  • Detect vulnerabilities in your Open Source components.
  • Provide automated fixes and upgrades.

How to set up the Snyk GitHub Enterprise integration

If your repositories are not internet-accessible, you must use Snyk Broker. This requires creating a startup script. For the script and instructions, see GitHub Enterprise - install and configure using Docker.
Follow these steps to connect Snyk with your GitHub repositories:
  1. 1.
    Create a dedicated service account in GitHub Enterprise with write level or higher permissions for the repos you want to monitor with Snyk permissions. See Types of GitHub accounts and Required permissions scope for the GitHub integration for details.
  2. 2.

How to generate a Personal Access Token

Generate a personal access token for the account with the following permissions:
  • repo (all)
  • admin:read: org
  • admin:repo_hooks (read & write)
If you are using fine-grained personal access tokens, the following repository permissions are required:
  • Administration: Read-only
  • Commit Status: Read and write
  • Content: Read and write
  • Metadata: Read-only
  • Pull requests: Read and write
  • Webhooks: Read and write
The Members Read Only Organization permission is required if you are using fine-grained personal access tokens.

How to authorize your Personal Access Token and enable SSO:

  1. 1.
    In Snyk, navigate to the Integrations page and click the GitHub Enterprise card.
  2. 2.
    Enter your GitHub Enterprise URL and the personal access token (PAT) for the service account you created, and Save your changes. When Snyk has successfully connected to the GitHub instance, the list of available repositories is displayed.
  3. 3.
    If your GitHub Enterprise organization enforces SAML/SSO, select Configure SSO next to the PAT in GitHub after the PAT has been created. Occasionally, SSO is enforced in your GitHub Enterprise organizations after a PAT and Integration are configured. If this happens, any Projects that have already been imported show in Snyk, but retests, PR Checks, and so on, will not be performed. If this happens, check the Configure SSO settings to ensure the GitHub Enterprise Organization is Authorized. On occasion, an Organization shows as Authorized, but the retests and PR checks do not work. If this happens, de-authorizing the Organization and then re-authorizing it may help.
To use the integration with GitHub Enterprise Cloud, add the URL ''. To integrate with a self-hosted GitHub Enterprise, add the URL '' in step two of PAT authorization.

How to import GitHub repositories

Select the repositories you want to import to Snyk and click Add selected repositories.
Snyk starts scanning the selected repositories for dependency files, such as package.json, in the entire directory tree and imports the repositories to Snyk as Projects.
The imported Projects appear on your Projects page and are continuously checked for vulnerabilities.
Imported Projects on the Projects page in Snyk
Imported Projects on the Projects page in Snyk

Uses of the Snyk GitHub Enterprise integration

Obtain Project-level security reports

Snyk produces advanced security reports, allowing you to explore the vulnerabilities found in your repositories and fix them by opening a fix pull request directly to your repository with the required upgrades or patches.
The example that follows shows a Project-level security report.
Project-level security report
Project-level security report

Monitor Projects and generate automatic fix pull requests

Snyk scans your Projects on either a daily or a weekly basis. When new vulnerabilities are found, Snyk notifies you by email and opens an automated pull request with fixes for your repositories.
The example that follows shows a fix pull request opened by Snyk.
Fix pull request created by Snyk
Fix pull request created by Snyk
To review and update the automatic fix pull request settings:
  1. 1.
    In Snyk, navigate to Settings > Integrations > Source control > GitHub Enterprise > Edit Settings.
  2. 2.
    Scroll to the Automatic fix pull requests section, then select options as required:
Automatic pull requests settings
Automatic pull request settings

Test new pull requests

The PR Checks feature enables Snyk to test any newly-created pull requests in your repositories for security vulnerabilities and sends a status check to GitHub. This allows you to see, directly from GitHub, whether the pull request introduces new security issues.
The following example shows how Snyk pull request checks appear on the pull requests page in GitHub.
Pull request checks shown in GitHub Enterprise
Pull request checks shown in GitHub Enterprise
To review and adjust the pull request tests settings: In Snyk, navigate to
Organization Settings > Integrations > Source control > GitHub Enterprise, and select Edit Settings.
  1. 1.
    Scroll to Snyk PR status checks; see Configure PR Checks for details.
Default Snyk test for pull requests setting enabled
Default Snyk test for pull requests setting enabled

Required permissions scope for Snyk GitHub Enterprise integration

All the operations, whether triggered manually or automatically, are performed for a GitHub service account that has its token configured on the integrations settings page. This shows the required access scopes for the configured token:
Required permissions in GitHub
Daily/weekly tests
Used to read manifest files in private repos.
repo (all)
Manual fix pull requests (triggered by the user)
Used to create fix PRs in the monitored repos.
repo (all)
Automatic fix and upgrade pull requests
Used to create fix or upgrade PRs in the monitored repos.
repo (all)
Snyk tests on pull requests
Used to send pull request status checks whenever a new PR is created or an existing PR is updated.
repo (all)
Importing new Projects to Snyk
Used to present a list of all the available repos in the GitHub org in the Add Projects screen (import popup).
admin:read:org, repo (all)
Snyk tests on pull requests : initial configuration
Used to add SCM webhooks to the imported repos. Snyk uses these webhooks to:
  • Track the state of Snyk pull requests, that is, when PRs are created, updated triggered, merged, and so on.
  • Send push events to trigger PR checks.
admin:repo_hooks (read & write)