Integrating SAST with AccuKnox in a GitHub CI/CD Pipeline¶
Overview¶
This guide explains how to use the AccuKnox SAST GitHub Action for integrating Static Application Security Testing (SAST) into a GitHub CI/CD pipeline. The process leverages SonarQube for scanning source code and uploads the results to AccuKnox CSPM for comprehensive vulnerability analysis and remediation.
Prerequisites¶
-
GitHub Repository Access: Ensure you have access to your repository where the workflow will be implemented.
-
SonarQube Access: Obtain API tokens and project details for SAST scanning.
-
AccuKnox Platform Access: Access your AccuKnox CSPM dashboard and generate an API token for integrations.
Steps for Integration¶
Step 1: Log in to AccuKnox Navigate to Settings and select Tokens to create an AccuKnox token for forwarding scan results to SaaS. For details on generating tokens, refer to How to Create Tokens
Step 2: Define GitHub Secrets
To securely store sensitive values, define the following secrets in your GitHub repository settings:
Secret Configuration Table
| Secret Name | Description |
|---|---|
SONAR_TOKEN |
API token for authenticating with SonarQube. |
SONAR_HOST_URL |
URL of your SonarQube server. |
ACCUKNOX_TOKEN |
API token for authenticating with AccuKnox. |
ACCUKNOX_ENDPOINT |
URL of the AccuKnox CSPM API. |
ACCUKNOX_LABEL |
The label for your scan. |
Step 3: Create GitHub Workflow
Add a new workflow file (.github/workflows/sast.yml) to your repository with the following configuration:
name: AccuKnox SAST Workflow
on:
push:
branches:
- main
jobs:
sast-scan:
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v4
- name: Run AccuKnox SAST
uses: accuknox/sast-scan-action@v1.0.3
with:
skip_sonar_scan: false
sonar_token: ${{ secrets.SONAR_TOKEN }}
sonar_host_url: ${{ secrets.SONAR_HOST_URL }}
accuknox_endpoint: ${{ secrets.ACCUKNOX_ENDPOINT }}
accuknox_token: ${{ secrets.ACCUKNOX_TOKEN }}
accuknox_label: ${{ secrets.ACCUKNOX_LABEL }}
sonar_project_key: "my-project-key"
Inputs for AccuKnox SAST Action¶
| Input Name | Description | Required | Default |
|---|---|---|---|
sonar_token |
Personal access token for authenticating with SonarQube. | Yes | None |
sonar_host_url |
URL of the SonarQube server for SAST. | Yes | None |
accuknox_endpoint |
URL of AccuKnox API to upload results. | Yes | None |
accuknox_token |
Token for authenticating with the AccuKnox API. | Yes | None |
accuknox_label |
Label for tagging results in AccuKnox SaaS. | Yes | None |
sonar_project_key |
SonarQube project key for identifying the project. | Yes | None |
skip_sonar_scan |
Skip SonarQube scan, for advanced users | No | false |
soft_fail |
Fail the pipeline if secrets are found. | Optional | false |
How It Works¶
-
Checkout Code: The workflow pulls the latest code from the repository.
-
SonarQube SAST Scan: Runs a SAST scan on the code using SonarQube.
-
Upload Results to AccuKnox: The scan results are uploaded to the AccuKnox CSPM platform for analysis and centralized monitoring.
-
Quality Gate Check: Ensures the project meets the quality standards defined in SonarQube.
Viewing Results in AccuKnox SaaS¶
View Results in AccuKnox SaaS¶
Step 1: After the workflow completes, navigate to the AccuKnox SaaS dashboard.
Step 2: Go to Issues > Findings and select Static Code Analysis Findings to see identified vulnerabilities.

Step 3: Click on a vulnerability to view more details.

Step 4: Fix the Vulnerability
Follow the instructions in the Solutions tab to fix the vulnerability

Step 5: Create a Ticket for Fixing the Vulnerability
Create a ticket in your issue-tracking system to address the identified vulnerability.

Step 6: Review Updated Results
-
After fixing the vulnerability, rerun the GitLab CI/CD pipeline.
-
Navigate to the AccuKnox SaaS dashboard and verify that the vulnerability has been resolved.
Benefits of Integration¶
-
Centralized monitoring and reporting of vulnerabilities.
-
Early detection of issues during the development lifecycle.
-
Actionable remediation guidance to improve code quality.
-
Easy integration into existing GitHub pipelines.
By integrating SonarQube SAST with AccuKnox in a GitHub Actions workflow, you ensure a secure development pipeline while leveraging the best practices in vulnerability management.