Catch CI/CD security vulnerabilities on every pull request.
Create .github/workflows/sentinel.yml in your repository:
# .github/workflows/sentinel.yml name: Security Scan on: pull_request: paths: ['.github/workflows/**'] push: branches: [main] paths: ['.github/workflows/**'] permissions: contents: read jobs: scan: runs-on: ubuntu-latest timeout-minutes: 10 steps: - uses: actions/checkout@v4 with: persist-credentials: false - uses: jpr5/sentinel@v1 with: severity: high
| Input | Description | Default |
|---|---|---|
| severity | Minimum severity to report (low / medium / high / critical) |
medium |
| fail-on-findings | Fail the check when findings exist | true |
| fix | Auto-fix findings and commit | false |
| sarif | Upload SARIF to GitHub Security tab | false |