CodeAnt CI Scan Action
A GitHub Action to run CodeAnt CI security and code quality analysis on your repository. You can find this action on the GitHub Marketplace.Features
- 🛡️ Automated security and code quality scanning
- 🔍 Deep code analysis and vulnerability detection
- 📊 Detailed reports and insights
- ⚡ Fast and easy integration
Usage
Basic Usage
Add this action to your workflow:Advanced Usage
Customize the scan with additional options:Inputs
| Input | Description | Required | Default |
|---|---|---|---|
access_token | GitHub Access Token | Yes | - |
api_base | CodeAnt API base URL | No | https://api.codeant.ai |
scanners | Comma-separated list of scanners to run | No | sast,sca |
include_paths | Comma-separated paths to include in scan | No | '' (all files) |
exclude_paths | Comma-separated paths to exclude from scan | No | '' (none) |
Setup
1. Get Your GitHub Access Token
- Log in to your GitHub account
- Go to Settings > Developer settings > Personal access tokens > Tokens (classic)
- Click Generate new token (classic)
- Select the
reposcope - Generate and copy the token
2. Add Token to GitHub Secrets
- Go to your repository’s Settings
- Navigate to Secrets and variables → Actions
- Click “New repository secret”
- Name:
ACCESS_TOKEN_GITHUB - Value: Paste your GitHub access token
- Click “Add secret”
3. Create Workflow File
Create.github/workflows/codeant-scan.yml in your repository with the usage example above.
Supported Events
This action works with any GitHub event that provides commit information:pushpull_requestworkflow_dispatchschedule
Example Workflows
Scan on Push and Pull Request
Scheduled Daily Scan
Scan Specific Directories with Security Focus
Scanner Options
🔍 Available Scanners: Thescanners input allows you to customize which security scanners run during analysis:
sast- Static Application Security Testing (code vulnerabilities)sca- Software Composition Analysis (dependency vulnerabilities)secrets- Secret detection (API keys, passwords, tokens)antipatterns- Code quality and duplicate code detectioniac- Infrastructure as Code security (Terraform, CloudFormation, etc.)all- Run all available scanners
sast,sca
Examples:
- Run all scanners:
scanners: 'all' - Only SAST:
scanners: 'sast' - SAST + Secrets:
scanners: 'sast,secrets' - Full security suite:
scanners: 'sast,sca,secrets,iac'
Scanner Configuration Examples
Run All Scanners
Security-Focused Scan
Troubleshooting
Authentication Errors
- Ensure your
ACCESS_TOKEN_GITHUBis correctly set in repository secrets - Verify the token hasn’t expired
- Check that the token has the necessary permissions
Scan Failures
- Verify your repository is accessible
- Check that the API base URL is correct
- Review the action logs for specific error messages
Support
- 📧 Email: [email protected]
- 📚 Documentation: https://docs.codeant.ai
- 🐛 Issues: GitHub Issues