Snyk action structure reference - Amazon CodePipeline
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

Snyk action structure reference

The Snyk action in CodePipeline automates detecting and fixing security vulnerabilities in your open source code. You can use Snyk with application source code in your third-party repository, such as GitHub or Bitbucket Cloud, or with images for container applications. Your action will scan and report on vulnerability levels and alerts that you configure.

Note

The CodePipeline action for Snyk is not available in the China (Beijing) and China (Ningxia) Regions. To reference other available actions, see Product and service integrations with CodePipeline.

Action type ID

  • Category: Invoke

  • Owner: ThirdParty

  • Provider: Snyk

  • Version: 1

Example:

{ "Category": "Invoke", "Owner": "ThirdParty", "Provider": "Snyk", "Version": "1" },

Input artifacts

  • Number of artifacts: 1

  • Description: The files that make up the input artifact for the invoke action.

Output artifacts

  • Number of artifacts: 1

  • Description: The files that make up the output artifact for the invoke action.

The following related resources can help you as you work with this action.