Render SARIF Security Reports directly in your Pull Requests – no GitHub Advanced Security (GHAS) required!
SARIF Courier is a GitHub Action that takes a SARIF (Static Analysis Results Interchange Format) report and posts a beautifully formatted summary as a comment on your Pull Requests. This enables you to surface security and static analysis findings in your PR workflow, even if you do not have access to GitHub Advanced Security (GHAS).
- No GHAS required: Works for all repositories, public or private.
- Instant feedback: See security and code analysis results right in your PRs.
- Easy integration: Just drop the action in your workflow and point it to your SARIF file.
- Universal: Works with any SARIF-compliant tool (CodeQL, Semgrep, ESLint, etc).
- No vendor lock-in: No need for GHAS or paid features.
- Fast feedback: Developers see issues before merging.
- GITHUB_TOKEN: Provided automatically by GitHub Actions. Used to post comments on PRs.
- Permissions required:
contents: write
(to create/update comments)pull-requests: write
(recommended for private repos)
- Permissions required:
No additional secrets or configuration are needed.
Note
SARIF Courier automatically uses environment variables provided by GitHub Actions for repository name, pull request number, and ref name. You do not need to set these manually—only GITHUB_TOKEN
is required for posting comments. See the GitHub Actions documentation for more details.
Name | Description | Required | Default |
---|---|---|---|
sarif_file | Path to the SARIF file to process. | Yes | results.sarif |
Add the following step to your workflow after generating a SARIF report:
- name: Render SARIF in PR
uses: Security-Falcon/SARIFCourier@v1
with:
sarif_file: path/to/your-report.sarif
name: Static Analysis
on:
pull_request:
branches: [main]
permissions:
contents: write
pull-requests: write
jobs:
scan:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Run your static analysis tool
run: |
# ...run your tool, output SARIF to results.sarif...
# ...assuming exit code 1
- name: Render SARIF in PR
if: failure()
uses: Security-Falcon/SARIFCourier@v1
with:
sarif_file: results.sarif
MIT License. See LICENSE.