Workflow Triggers
Triggers define when a workflow should start. A trigger is an event or detection that activates the automation logic. For example, a trigger can be a newly discovered vulnerability, a failed security scan, or a change in source control posture.
Triggers are tied to security policies. A policy violation activates the workflow.
Regular scan commonly used triggers
These triggers activate when a policy violation is detected during a regular scan. They cover different policy types across code, dependencies, infrastructure, and security tools.
Any Policy
Activates when any policy violation is detected, regardless of type.
Any Git Posture Policy
Activates when a Git posture-related issue is detected, such as exposed secrets or unsafe branch protection rules.
Any Code Security Policy
Activates when a code security issue is detected, including SAST findings or unapproved SaaS usage.
Any Secret/PII Scan Policy
Activates when secrets or personally identifiable information (PII) are detected in code or history.
Any Open Source Security Policy
Activates when an open source vulnerability or license risk is detected.
Any SBOM Policy
Activates when a Software Bill of Materials (SBOM) issue is detected, such as unapproved or malicious dependencies.
Any Infrastructure as Code Scan Policy
Activates when a misconfiguration or issue is detected in Infrastructure as Code (IaC) files.
Any CI/CD Posture Policy
Activates when an insecure practice is detected in CI/CD pipelines.
Any Security Tool Coverage Policy
Activates when issues are detected by an integrated security tool, or when coverage gaps are identified.
Any Container Security Policy
Activates when a vulnerability, secret, or misconfiguration is detected in a container image.
Any Dynamic App Security Policy
Activates when an application fails a dynamic security test, such as DAST.
Any Artifact Integrity Policy
Activates when an artifact fails integrity checks, such as mismatched signatures.
Any Cloud Context Policy
Activates when a cloud security issue is detected in the environment or configuration.
Any Manual Upload Policy
Activates when issues are detected in manually uploaded files or scan results.
Regular Scan Git Posture Triggers
These triggers activate when insecure repository configurations or risky Git practices are detected. They help enforce branch protection, code review requirements, access controls, and repository hygiene.
Any Git Posture Policy
Activates when any Git posture-related issue is detected.
Unreviewed Code Change
Activates when code is committed without a required review.
Veteran Developer Review Required
Activates when a review from a veteran or senior developer is required but missing.
Branch Protection Not Enforced
Activates when branch protection rules are not applied.
Branch Protection Code Review Can Be Ignored by Developer
Activates when a developer can bypass required code reviews.
Branch Protection Code Review Can Be Ignored by Outside Collaborator
Activates when an external collaborator can bypass required code reviews.
Branch Protection Push Restriction Can Be Ignored by Developer
Activates when a developer can bypass push restrictions on a protected branch.
Branch Protection Push Restriction Can Be Ignored by Outside Collaborator
Activates when an external collaborator can bypass push restrictions.
Protected Branch Can Be Deleted by a Non-Admin
Activates when non-admin users can delete protected branches.
Branch Protection Allows Unsigned Commits
Activates when unsigned commits are allowed on a protected branch.
Private Repo Forking Is Enabled
Activates when private repositories allow forking.
Private Repo Fork Detected
Activates when a fork of a private repository is detected.
Public Repo Detected
Activates when a repository is public.
Org Owner With No Admin Activity
Activates when an organization owner has not performed any admin activity.
Too Many Org Owners
Activates when the number of organization owners exceeds the recommended limit.
Single Owner in Org
Activates when an organization has only one owner.
Repo Admin With No Admin Activity
Activates when a repository admin has not performed any admin activity.
Too Many Repo Admins
Activates when the number of repository admins exceeds the recommended limit.
Repo Wiki Publicly Editable
Activates when a repository wiki can be edited by the public.
Developer Did Not Write Code in Repo
Activates when a developer is listed but has no code contributions.
Outside Collaborator Is a Repo Admin
Activates when an outside collaborator has repository admin permissions.
Outside Collaborator Is a Repo Maintainer
Activates when an outside collaborator has repository maintainer permissions.
Outside Collaborator With No Activity
Activates when an outside collaborator has no recorded activity.
Outside Collaborator Not Using 2FA
Activates when an outside collaborator does not use two-factor authentication.
Missing 2FA in Organization
Activates when the organization does not enforce two-factor authentication.
Bot User Is an Org Owner
Activates when a bot user has organization owner permissions.
Bot User Is a Repo Admin
Activates when a bot user has repository admin permissions.
License File Missing in Repo
Activates when a repository does not include a license file.
Security Policy File Missing in Repo
Activates when a repository does not include a security policy file.
CODEOWNERS File Missing in Repo
Activates when a repository does not include a CODEOWNERS file.
Unarchived Stale Repo
Activates when a stale repository remains unarchived.
Regular scan code security triggers
These triggers activate when issues are detected in source code during static analysis. They help identify insecure coding practices, logic flaws, and maintainability risks.
Any code security policy
Activates when any code security issue is detected.
SAST issue
Activates when a static application security testing (SAST) tool identifies a vulnerability in code.
Code smell issue
Activates when a code smell or maintainability problem is detected, such as unused variables or overly complex methods.
Regular scan secret/PII scan triggers
These triggers activate when secrets or personally identifiable information (PII) are detected in code, logs, or version history. They help prevent sensitive data from being exposed in repositories.
Any secret/PII scan policy
Activates when any secret or PII-related issue is detected.
Secret in code
Activates when a secret, such as an API key, password, or token, is found in source code.
Secret in Git history
Activates when a secret is found in the Git commit history.
Secret logging in code
Activates when a secret is written to logs by the code.
PII embedded in code
Activates when personal data, such as names, emails, or identifiers, is hardcoded into source code.
PII logging in code
Activates when personal data is written to logs by the code.
PII in Git history
Activates when personal data is found in the Git commit history.
Regular scan open source security triggers
These triggers activate when vulnerabilities or risks are detected in open source components. They help manage CVEs in dependencies, images, and manifests across different environments.
Any open source security policy
Activates when any open source security issue is detected.
Vulnerable dependency (CVE) in code
Activates when a code dependency contains a known vulnerability (CVE).
Vulnerable base image (CVE) in Dockerfile
Activates when a base image defined in a Dockerfile contains a known vulnerability.
Vulnerable public image (CVE) in Docker Compose
Activates when a public image referenced in a Docker Compose file contains a known vulnerability.
Vulnerable public image (CVE) in Kubernetes manifest
Activates when a public image used in a Kubernetes manifest contains a known vulnerability.
Vulnerable public image (CVE) in Helm chart
Activates when a public image referenced in a Helm chart contains a known vulnerability.
Vulnerable public image (CVE) in Terraform
Activates when a public image referenced in Terraform configuration contains a known vulnerability.
Vulnerable public image (CVE) in CI/CD deployment
Activates when a public image used in a CI/CD deployment contains a known vulnerability.
Regular scan SBOM triggers
These triggers activate when issues are detected in the software bill of materials (SBOM). They help identify risks in dependencies, licenses, and package sources.
Any SBOM policy
Activates when any SBOM-related issue is detected.
Typosquatting dependency in code
Activates when a dependency name closely resembles a popular package, suggesting a typosquatting attack.
Malicious dependency in code
Activates when a dependency is identified as malicious.
Dependency confusion: organization scope in code
Activates when a dependency in organization scope is at risk of dependency confusion.
Dependency confusion: private package in code
Activates when a private package is at risk of dependency confusion.
Unapproved license used by direct dependency in code
Activates when a direct dependency uses a license that is not approved.
Unapproved license used in forked open source
Activates when a forked open source project includes an unapproved license.
Unapproved license detected by 3rd party security app
Activates when a third-party security application detects an unapproved license.
Deprecated direct dependency in code
Activates when a direct dependency is marked as deprecated.
Outdated direct dependency in code
Activates when a direct dependency is outdated and no longer maintained.
Unpopular direct dependency in code
Activates when a direct dependency is rarely used across the ecosystem, increasing risk of poor support.
Unused direct dependency in code
Activates when a direct dependency is included but not used in the codebase.
Unapproved license used by indirect dependency in code
Activates when an indirect (transitive) dependency uses a license that is not approved.
Deprecated indirect dependency in code
Activates when an indirect dependency is marked as deprecated.
Outdated indirect dependency in code
Activates when an indirect dependency is outdated and no longer maintained.
Unpopular indirect dependency in code
Activates when an indirect dependency is rarely used across the ecosystem.
Untrusted source for dependency in code
Activates when a dependency originates from an untrusted or unverified source.
Regular scan CI/CD posture triggers
These triggers activate when risks or misconfigurations are detected in CI/CD pipelines and workflows. They help secure automation processes, prevent misuse of secrets, and ensure least-privilege practices.
Any CI/CD posture policy
Activates when any CI/CD-related posture issue is detected.
CI/CD workflow security issue
Activates when a generic CI/CD workflow security issue is identified.
Secret echoed in workflow console
Activates when a secret is printed to the CI/CD logs.
Deprecated command in workflow
Activates when a workflow uses a deprecated command.
CI/CD context values in workflow
Activates when context values in workflows expose sensitive information.
CI/CD bot can approve code review
Activates when a CI/CD automation bot has permission to approve code reviews.
Incorrect storage of secret in GitHub Action
Activates when secrets are improperly stored in GitHub Actions workflows.
Excessive permissions in workflow file
Activates when a workflow file is configured with unnecessary privileges.
Excessive permissions in workflow setting
Activates when workflow configuration grants excessive permissions.
Unpinned (SHA) third-party actions in GitHub
Activates when GitHub Actions are used without pinning to a secure commit SHA.
Unauthorized serverless function deployment
Activates when a serverless function is deployed without authorization.
Unauthorized CI/CD used
Activates when an unapproved CI/CD platform is used in the organization.
Malicious webhook
Activates when a webhook is flagged as malicious.
Suspicious webhook
Activates when webhook activity is suspicious but not yet confirmed as malicious.
Webhook with unknown reputation
Activates when a webhook source cannot be verified.
Anomaly in webhook usage
Activates when unusual or abnormal webhook behavior is detected.
Webhook without SSL/TLS
Activates when a webhook is not protected with SSL/TLS encryption.
Webhook without secret key
Activates when a webhook does not use a secret key for validation.
Regular scan security tool coverage triggers
These triggers activate when gaps are detected in the use of security tools. They help identify missing, disabled, or unsupported tools across CI/CD pipelines.
Any security tool coverage policy
Activates when any issue related to security tool coverage is detected.
SAST missing in CI/CD pipeline
Activates when static application security testing (SAST) is not included in a pipeline.
SAST disabled
Activates when SAST is present but turned off.
SAST unsupported language
Activates when SAST cannot analyze code due to an unsupported language.
Open source security missing in CI/CD pipeline
Activates when open source security scanning is not included in a pipeline.
Open source security disabled
Activates when open source security scanning is present but turned off.
Open source security unsupported language
Activates when open source security scanning cannot analyze due to an unsupported language.
Secrets detection missing in CI/CD pipeline
Activates when secret scanning is not included in a pipeline.
Regular scan container security triggers
These triggers activate when vulnerabilities, misconfigurations, or risks are found in container images. They help ensure that containerized applications are secure before deployment.
Any container security policy
Activates when any container security issue is detected.
Vulnerable dependency (CVE) in container from user code
Activates when a CVE is detected in dependencies added by user code inside a container.
Vulnerable dependency (CVE) in container from user instruction
Activates when a CVE is detected in dependencies added through build instructions (e.g., Dockerfile).
Vulnerable dependency (CVE) in container from base image
Activates when a CVE is detected in the base image used for building a container.
Vulnerable dependency (CVE) in container from operating system
Activates when a CVE is detected in the operating system packages inside a container.
Vulnerable dependency (CVE) in public image hosted in private registry
Activates when a CVE is detected in a public image stored in a private registry.
Vulnerable dependency (CVE) in Java archive package
Activates when a CVE is detected in a Java archive (JAR) package within a container.
Secret in container
Activates when secrets are detected inside a container image.
PII in container
Activates when personally identifiable information (PII) is detected inside a container image.
Unapproved dependency license in container
Activates when a container contains a dependency with a disallowed license.
Misconfiguration in container
Activates when a container configuration does not comply with security best practices.
Regular scan dynamic app security triggers
These triggers activate when issues are detected by dynamic application security testing (DAST). They help identify vulnerabilities exposed during runtime.
Any dynamic app security policy
Activates when any DAST-related issue is detected.
DAST issue
Activates when a vulnerability is detected during dynamic testing of an application.
Regular scan artifact integrity triggers
These triggers activate when artifacts used in builds or deployments come from untrusted or unverified sources. They help ensure supply chain integrity.
Any artifact integrity policy
Activates when any artifact integrity issue is detected.
Registry artifact not from CI/CD
Activates when an artifact originates outside of the CI/CD pipeline.
Cloud artifact is not from trusted registry
Activates when an artifact is pulled from an unapproved or untrusted registry.
Regular scan cloud context triggers
These triggers activate when cloud-specific vulnerabilities or misconfigurations are detected. They help secure cloud environments, workloads, and services.
Any cloud context policy
Activates when any cloud security issue is detected.
CSPM issue
Activates when a cloud security posture management (CSPM) tool finds a misconfiguration.
CSPM secret
Activates when secrets are exposed in cloud CSPM scans.
Runtime open source vulnerability
Activates when an open source vulnerability is detected in a cloud runtime environment.
Runtime operating system vulnerability
Activates when an OS vulnerability is detected in a cloud runtime.
Vulnerable dependency (CVE) in VM
Activates when a CVE is detected in a virtual machine.
Vulnerable public image (CVE) in Kubernetes cluster
Activates when a vulnerable public image is deployed in a Kubernetes cluster.
Vulnerable dependency (CVE) in cloud functions
Activates when a CVE is detected in a cloud function dependency.
SAST in cloud functions
Activates when a static analysis finding is detected in cloud function code.
Secrets in cloud functions
Activates when secrets are detected in cloud functions.
SAST in runtime
Activates when a static analysis finding is detected in runtime workloads.
Secret in runtime
Activates when secrets are detected in runtime workloads.
Vulnerability management
Activates when cloud vulnerability management identifies issues.
Regular scan manual upload triggers
These triggers activate when issues are added manually to the platform. They help track findings imported outside of automated scanning.
Any manual upload policy
Activates when any issue from a manual upload is detected.
Manual issues upload
Activates when issues are uploaded manually into the system.
Last updated
