You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/mission-control/integrations/snyk.mdx
+2-150Lines changed: 2 additions & 150 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,154 +60,6 @@ Connect Snyk to Continue Mission Control to enable agents to automatically detec
60
60
61
61
</Info>
62
62
63
-
## Use Cases
64
-
65
-
### Code Vulnerability Scanning (SAST)
66
-
67
-
Scan your source code for security vulnerabilities:
68
-
69
-
<Cardtitle="Code Security Agent"icon="code">
70
-
71
-
**Task Example**: "Run a Snyk Code scan on this repo with severity threshold medium. Summarize issues with file:line locations and propose minimal fixes for the top 3 critical issues."
72
-
73
-
**What the Agent Does**:
74
-
- Performs static application security testing on your code
75
-
- Identifies security vulnerabilities with exact file and line numbers
76
-
- Prioritizes issues by severity and exploitability
77
-
- Generates minimal, targeted fixes for critical issues
78
-
- Re-runs scans to verify fixes resolve the vulnerabilities
79
-
80
-
**Run in Mission Control**: Set up as pre-commit hook or PR check
81
-
82
-
</Card>
83
-
84
-
### Dependency Scanning (SCA)
85
-
86
-
Check open source dependencies for known vulnerabilities:
**Task Example**: "Run Snyk Open Source scan including dev dependencies. Summarize vulnerable dependency paths and propose a minimal-risk upgrade plan."
91
-
92
-
**What the Agent Does**:
93
-
- Performs software composition analysis on all dependencies
94
-
- Maps vulnerability paths through dependency tree
95
-
- Identifies minimal-risk upgrade strategies
96
-
- Creates dependency update plans with compatibility checks
97
-
- Re-tests after proposed changes to confirm resolution
98
-
99
-
**Run in Mission Control**: Schedule weekly or trigger on package updates
100
-
101
-
</Card>
102
-
103
-
### Infrastructure as Code (IaC) Security
104
-
105
-
Scan Terraform, CloudFormation, and Kubernetes configs:
106
-
107
-
<Cardtitle="IaC Security Agent"icon="cloud">
108
-
109
-
**Task Example**: "Scan ./infra directory with Snyk IaC. Report high/critical misconfigurations with exact files and lines. Provide corrected configurations."
110
-
111
-
**What the Agent Does**:
112
-
- Scans infrastructure code for security misconfigurations
113
-
- Identifies exposed secrets and overly permissive policies
114
-
- Reports exact file locations and line numbers
115
-
- Provides secure configuration alternatives
116
-
- Re-scans to confirm misconfigurations are resolved
117
-
118
-
**Run in Mission Control**: Run before infrastructure deployments
0 commit comments