You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,23 +39,23 @@ By default, the `/security:analyze` command determines the scope of the analysis
39
39
40
40
## GitHub Integration
41
41
42
-
### I already use run-gemini-cli workflows in my repository:
42
+
### I already use [run-gemini-cli](https://github.com/google-github-actions/run-gemini-cli) workflows in my repository:
43
43
44
44
* Replace your existing `gemini-review.yml` with this [updated workflow](https://github.com/gemini-cli-extensions/security/blob/main/.github/workflows/gemini-review.yml), which includes the new Security Analysis step.
45
45
46
-
### I don't use run-gemini-cli workflows in my repository yet:
46
+
### I don't use [run-gemini-cli](https://github.com/google-github-actions/run-gemini-cli) workflows in my repository yet:
47
47
48
48
1. Integrate the Gemini CLI Security Extension into your GitHub workflow to analyze incoming code:
49
49
50
-
1. Follow Steps 1-3 in this [Quick Start](https://github.com/google-github-actions/run-gemini-cli?tab=readme-ov-file#quick-start).
50
+
2. Follow Steps 1-3 in this [Quick Start](https://github.com/google-github-actions/run-gemini-cli?tab=readme-ov-file#quick-start).
51
51
52
-
1. Create a `.github/workflows` directory in your repository's root (if it doesn't already exist).
52
+
3. Create a `.github/workflows` directory in your repository's root (if it doesn't already exist).
53
53
54
-
1. Copy this [Example Workflow](https://github.com/gemini-cli-extensions/security/blob/main/.github/workflows/gemini-review.yml) into the `.github/workflows` directory.
54
+
4. Copy this [Example Workflow](https://github.com/gemini-cli-extensions/security/blob/main/.github/workflows/gemini-review.yml) into the `.github/workflows` directory. See the run-gemini-cli [configuration](https://github.com/google-github-actions/run-gemini-cli?tab=readme-ov-file#configuration) to make changes to the workflow.
55
55
56
-
1. Ensure the new workflow file is committed and pushed to GitHub.
56
+
5. Ensure the new workflow file is committed and pushed to GitHub.
57
57
58
-
1. Open a new pull request, or comment `@gemini-cli /review` on an existing PR, to run the Gemini CLI Code Review along with Security Analysis.
58
+
6. Open a new pull request, or comment `@gemini-cli /review` on an existing PR, to run the Gemini CLI Code Review along with Security Analysis.
Copy file name to clipboardExpand all lines: commands/security/analyze-github-pr.toml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -132,7 +132,7 @@ After completing these two initial tasks, continue executing the dynamically gen
132
132
133
133
3.1 **Create Pending Review:** Call `create_pending_pull_request_review`. Ignore errors like "can only have one pending review per pull request" and proceed to the next step.
134
134
135
-
3.2 **Add Comments and Suggestions:** For each formulated review comment, make the mcp call `add_comment_to_pending_review`.
135
+
3.2 **Add Comments and Suggestions:** For each formulated review comment, call `add_comment_to_pending_review`.
136
136
137
137
2a. When there is a code suggestion (preferred), structure the comment payload using this exact template:
0 commit comments