Skip to content

Commit 2f7f96e

Browse files
bdougieContinuecubic-dev-ai[bot]RomneyDa
authored
docs: simplify Snyk integration documentation (#8781)
* docs: Improve Snyk integration documentation Updated the Snyk integration documentation by removing detailed use cases for various security scanning agents, including Code Vulnerability Scanning, Dependency Scanning, Infrastructure as Code Security, Container Security Scanning, Pull Request Security Scanning, and Security Learning Integration. Adjusted the webhook configuration section for clarity. * Trigger CI re-run Generated with [Continue](https://continue.dev) Co-Authored-By: Continue <[email protected]> * Apply suggestion from @cubic-dev-ai[bot] Co-authored-by: cubic-dev-ai[bot] <191113872+cubic-dev-ai[bot]@users.noreply.github.com> --------- Co-authored-by: Continue <[email protected]> Co-authored-by: cubic-dev-ai[bot] <191113872+cubic-dev-ai[bot]@users.noreply.github.com> Co-authored-by: Dallin Romney <[email protected]>
1 parent 90d54f3 commit 2f7f96e

File tree

1 file changed

+2
-150
lines changed
  • docs/mission-control/integrations

1 file changed

+2
-150
lines changed

docs/mission-control/integrations/snyk.mdx

Lines changed: 2 additions & 150 deletions
Original file line numberDiff line numberDiff line change
@@ -60,154 +60,6 @@ Connect Snyk to Continue Mission Control to enable agents to automatically detec
6060

6161
</Info>
6262

63-
## Use Cases
64-
65-
### Code Vulnerability Scanning (SAST)
66-
67-
Scan your source code for security vulnerabilities:
68-
69-
<Card title="Code Security Agent" icon="code">
70-
71-
**Task Example**: "Run a Snyk Code scan on this repo with severity threshold medium. Summarize issues with file:line locations and propose minimal fixes for the top 3 critical issues."
72-
73-
**What the Agent Does**:
74-
- Performs static application security testing on your code
75-
- Identifies security vulnerabilities with exact file and line numbers
76-
- Prioritizes issues by severity and exploitability
77-
- Generates minimal, targeted fixes for critical issues
78-
- Re-runs scans to verify fixes resolve the vulnerabilities
79-
80-
**Run in Mission Control**: Set up as pre-commit hook or PR check
81-
82-
</Card>
83-
84-
### Dependency Scanning (SCA)
85-
86-
Check open source dependencies for known vulnerabilities:
87-
88-
<Card title="Dependency Security Agent" icon="cube">
89-
90-
**Task Example**: "Run Snyk Open Source scan including dev dependencies. Summarize vulnerable dependency paths and propose a minimal-risk upgrade plan."
91-
92-
**What the Agent Does**:
93-
- Performs software composition analysis on all dependencies
94-
- Maps vulnerability paths through dependency tree
95-
- Identifies minimal-risk upgrade strategies
96-
- Creates dependency update plans with compatibility checks
97-
- Re-tests after proposed changes to confirm resolution
98-
99-
**Run in Mission Control**: Schedule weekly or trigger on package updates
100-
101-
</Card>
102-
103-
### Infrastructure as Code (IaC) Security
104-
105-
Scan Terraform, CloudFormation, and Kubernetes configs:
106-
107-
<Card title="IaC Security Agent" icon="cloud">
108-
109-
**Task Example**: "Scan ./infra directory with Snyk IaC. Report high/critical misconfigurations with exact files and lines. Provide corrected configurations."
110-
111-
**What the Agent Does**:
112-
- Scans infrastructure code for security misconfigurations
113-
- Identifies exposed secrets and overly permissive policies
114-
- Reports exact file locations and line numbers
115-
- Provides secure configuration alternatives
116-
- Re-scans to confirm misconfigurations are resolved
117-
118-
**Run in Mission Control**: Run before infrastructure deployments
119-
120-
</Card>
121-
122-
### Container Security Scanning
123-
124-
Analyze Docker images for vulnerabilities:
125-
126-
<Card title="Container Security Agent" icon="docker">
127-
128-
**Task Example**: "Scan Docker image my-api:latest excluding base image vulnerabilities. Show dependency tree and recommend safer base images."
129-
130-
**What the Agent Does**:
131-
- Scans container images for OS and application vulnerabilities
132-
- Analyzes complete dependency tree in containers
133-
- Recommends security-hardened base images
134-
- Creates optimized Dockerfiles with security improvements
135-
- Re-tests after changes to verify vulnerability reduction
136-
137-
**Run in Mission Control**: Trigger on container builds or before deployments
138-
139-
</Card>
140-
141-
### Pull Request Security Scanning
142-
143-
Focus scanning on modified files:
144-
145-
<Card title="PR Security Agent" icon="code-branch">
146-
147-
**Task Example**: "Scan only files changed since origin/main with Snyk Code. Block if new high severity issues would be introduced."
148-
149-
**What the Agent Does**:
150-
- Targets security scanning to changed files only
151-
- Compares security posture before and after changes
152-
- Identifies newly introduced vulnerabilities
153-
- Shows security impact delta for the PR
154-
- Blocks merge if critical issues are detected
155-
156-
**Run in Mission Control**: Set up as PR check automation
157-
158-
</Card>
159-
160-
### Security Learning Integration
161-
162-
Access contextual security education:
163-
164-
<Card title="Security Education Agent" icon="graduation-cap">
165-
166-
**Task Example**: "Open Snyk Learn lessons related to the top CWE vulnerabilities from this scan."
167-
168-
**What the Agent Does**:
169-
- Maps vulnerabilities to Common Weakness Enumeration (CWE) categories
170-
- Retrieves relevant Snyk Learn educational content
171-
- Provides contextual security training based on actual issues
172-
- Links to remediation guides and best practices
173-
- Tracks security knowledge gaps across the team
174-
175-
**Run in Mission Control**: Run after security scans for team education
176-
177-
</Card>
178-
179-
## Running Snyk Agents in Mission Control
180-
181-
You can run Snyk-connected agents in two ways:
182-
183-
### 1. Manual Tasks
184-
185-
Trigger agents on-demand for vulnerability analysis:
186-
187-
1. Go to [Mission Control Agents](https://hub.continue.dev/agents)
188-
2. Select or create a Snyk-enabled agent
189-
3. Click "Run Agent" and provide your task description
190-
4. Monitor progress and review results in real-time
191-
192-
**Example Tasks:**
193-
- "Scan all projects for critical vulnerabilities and prioritize fixes"
194-
- "Update all npm dependencies with known vulnerabilities"
195-
- "Generate a security report for the last sprint"
196-
197-
### 2. Automated Workflows
198-
199-
Set up agents to run automatically:
200-
201-
- **Webhook-triggered**: Execute when new vulnerabilities are detected
202-
- **Scheduled**: Run daily or weekly security scans
203-
- **PR-triggered**: Scan new dependencies before merge
204-
205-
<Tip>
206-
207-
Start with manual tasks to understand your vulnerability patterns, then automate the most common remediation workflows for continuous security.
208-
209-
</Tip>
210-
21163
## Integration with GitHub
21264

21365
Combine Snyk with GitHub integration for a complete security workflow:
@@ -290,7 +142,7 @@ Track your agent's security remediation performance:
290142
**Problem**: Agent isn't running when new vulnerabilities are found
291143

292144
**Solutions**:
293-
- Verify webhook configuration in Snyk settings
145+
- Verify webhook configuration in Snyk integration settings
294146
- Check that webhook URL points to Continue Mission Control
295147
- Ensure webhook events include vulnerability detection
296148
- Review webhook delivery logs in Snyk
@@ -313,4 +165,4 @@ Track your agent's security remediation performance:
313165

314166
</Card>
315167

316-
</CardGroup>
168+
</CardGroup>

0 commit comments

Comments
 (0)