GitHub Action Setup for Local On-Prem Code Scanning
Introduction
The Aikido Security Local Scanner enables you to run scans directly within your GitHub Action and/or if you're using a GitHub Enterprise Server (GHES) environment. Your code never leaves your premises: scans are executed locally and only the results are uploaded to the Aikido Security platform. This setup ensures maximum privacy while still letting you manage vulnerabilities through the Aikido dashboard.
This is NOT applicable for normal cloud based scanner. This GitHub Action setup is only intended for on-prem scanning with local binaries.
Prerequisites
A GitHub Enterprise Server environment (self-hosted or enterprise-managed).
A CI/CD runner - GitHub Actions
An Aikido Local Scanning account.
System requirements:
2–4 CPU cores
8–16 GB RAM
Outbound HTTPS (443) access enabled
How to set up Local On-Prem Scanning via Binaries
Prerequisite: make sure to have created an account that allows for Local Scanning. More information on creating a Local Scanning Account.
1. Generate an Authentication Token
Go to the Local Scanner setup page.
Generate an authentication token and copy. Note that you will only be able to view this token once.
Add this token as argument
--apikey
when running the Local Scanner in your project.Save this token in your GitHub Secrets by going to Settings > Secrets and variables > Actions.
Repository secrets management interface showing the stored AIKIDO_API_KEY secret.
2. Running the Local Scanner
Now all that is left to run the scanner on your repository. Make sure that the local scanner is only triggered for your default branch. By default, Aikido supports scanning one branch in your repository for dependency and code issues, typically the main or master branch. Therefore, we recommend running the local scanner exclusively on that branch to avoid mixing scan results on the Aikido platform. You can specify this in the 'on' section of your workflow file.
Using Docker
The easiest way to use our local scanner in your GitHub Actions is by using our Docker image.
Example .github/workflows/aikido-scan.yml
:
on:
push:
branches:
- main
name: Aikido Scan
jobs:
aikido-local-scan-repo:
runs-on: ubuntu-latest
container:
image: aikidosecurity/local-scanner:latest
steps:
- uses: actions/checkout@v4
with:
token: ${{ secrets.GITHUB_TOKEN }}
path: my-repo
- name: Run scan
run: aikido-local-scanner scan my-repo --apikey ${{ secrets.AIKIDO_API_KEY }} --repositoryname MyRepo --branchname main
Specify your preferred branch using the --branchname
option when executing the command.
If this is the first scan for this repository, Aikido will create a repository with the name you specified, containing all the scanning results. Subsequent scan results will be collected under this repository name in Aikido.
By default all scan types will be executed, if you'd like to run only a selection of scans (eg only a SAST scan), you can do so by supplying the scan types via the --scan-types
option. More information on CLI options can be found here.
You can also run the scanner in release or PR gating mode. Release gating mode is helpful when scanning your repository prior to releasing, as it ensures there are no open issues before a potential release. When running in release gating mode, the scanner process will fail when there are any open issues of the chosen severity or higher after the scan is finished. PR gating mode can be used to scan for any potentially newly introduced issues in a PR.
More information about release or PR gating mode can be found in this article.
3. Check your scanning results
After the first scan:
A repository will appear in Aikido with the name you provided in
-repositoryname
.Subsequent scans will update the same repository with new findings.
You can configure scans to run in release gating or PR gating mode if you want to block deployments with unresolved issues.
Notes & Limitations
Local Scanner accounts does not include AutoFix in the UI. AutoFix will be available via IDE integrations
By default, all scan types are enabled. You can limit scans (e.g., SAST only) using the
-scan-types
flag.Read "CLI option for Local Scanner" to view all options that can be passed when running the local scanner.
Only one branch (usually
main
ormaster
) should be scanned to avoid mixing results.
Last updated
Was this helpful?