Quick Start
Add to.github/workflows/security.yml:
Inputs
All inputs are optional. The action is defined inaction.yml.
| Input | Default | Description |
|---|---|---|
path | ./ | Path to scan (file or directory) |
severity | info | Minimum severity to report: critical, high, medium, low, info |
fail-on | (none) | Exit with code 1 if findings at or above this severity are found |
format | sarif | Output format: sarif, json, terminal, markdown |
output | aguara-results.sarif | Output file path |
verbose | false | Show rule descriptions and confidence scores |
rules | (none) | Additional custom rules directory |
disable-rule | (none) | Comma-separated rule IDs to disable |
max-file-size | (50MB) | Maximum file size to scan (e.g. 100MB) |
version | (latest) | Pin a specific Aguara version (e.g. v0.5.0) |
upload-sarif | true | Upload SARIF results to GitHub Code Scanning |
Outputs
| Output | Description |
|---|---|
findings-count | Number of security findings detected |
exit-code | Exit code from the aguara scan command |
Examples
Scan specific directory with severity threshold
./mcp-server/, reports findings at medium severity or above, and fails the build if high or critical findings are detected.
Scan with custom rules
./custom-rules/ and disables specific built-in rules.
Pin a specific version
JSON output without SARIF upload
Verbose output with all findings
Use findings count in subsequent steps
SARIF Upload Setup
Permissions
SARIF upload requires thesecurity-events: write permission:
Private repositories
GitHub Code Scanning is free for public repositories. For private repositories, you need:- GitHub Advanced Security enabled
- A GitHub Enterprise Cloud or GitHub Enterprise Server license
Viewing results
Once uploaded, findings appear in:- Security tab → Code scanning alerts
- Pull request checks (if findings match changed lines)
- Commit status checks
Complete Workflow Example
- Runs on pushes, pull requests, and weekly
- Scans
.claude/skills/for medium+ findings - Fails on high/critical findings
- Uploads SARIF to Code Scanning
- Saves SARIF as a workflow artifact
- Comments on PRs when findings are detected
Manual Installation
If you prefer not to use the action, install and run Aguara manually:Troubleshooting
SARIF upload fails with 403
Ensuresecurity-events: write permission is set:
No findings appear in Code Scanning
Check:- SARIF file was created:
ls -lh aguara-results.sarif - Upload step succeeded: check workflow logs
- You have Advanced Security (for private repos)
Action fails but local scan works
The action runs with--no-color and --no-update-check by default. Test locally:
Next Steps
GitLab CI
Integrate with GitLab CI/CD pipelines
Docker
Run Aguara in Docker containers
