Wisec Logo

Wisec

Wisec
FeaturesPricingDocsRoadmapBlogFAQLoginStart for Free

GitHub Actions Integration

This guide provides specific instructions for integrating the Wisec agent into your GitHub Actions workflows.

1. Prerequisites

Before proceeding, ensure you have:

  • A Wisec account and project created.

  • Your Project ID from the Wisec dashboard.

  • Your Agent Signing Key (Private Key) generated from the Wisec dashboard.

Refer to the Installation Guide for details on obtaining these.

2. Configure GitHub Secrets

Go to your GitHub repository's Settings > Secrets and variables > Actions. Add the following repository secrets:

  • WISEC_PROJECT_ID:

    • Value: Your project's unique ID from the Wisec dashboard.

  • AGENT_PRIVATE_KEY_HEX:

    • Value: The private part of your Ed25519 signing key pair, obtained from the Wisec dashboard Settings page.

  • WISEC_API_ENDPOINT:

    • Value: https://app.wisec.io/api/v1/events

3. Modify your GitHub Actions Workflow

Add a new job or a step within an existing job in your .github/workflows/wisec-scan.yml file to download and execute the Wisec agent.

# .github/workflows/wisec-scan.yml example for Wisec integration

name: Wisec Security Scan

on:
  push:
    branches: [ "master", "main" ]
  pull_request:
    branches: [ "master", "main" ]

jobs:
  wisec-security-scan:
    runs-on: ubuntu-latest # Or your preferred runner
    steps:
    - uses: actions/checkout@v3

    - name: Install Git & Curl (if not already present)
      run: |
        sudo apt-get update
        sudo apt-get install -y git curl tar

    - name: Download Gitleaks & Wisec Agent
      run: |
        echo "Downloading gitleaks..."
        wget https://github.com/gitleaks/gitleaks/releases/download/v8.18.2/gitleaks_8.18.2_linux_x64.tar.gz
        tar -xzf gitleaks_8.18.2_linux_x64.tar.gz
        chmod +x gitleaks
        sudo mv gitleaks /usr/local/bin/ # Optional: move to path for easy access
        echo "Downloading wisec-agent..."
        curl -L -o wisec-agent https://storage.googleapis.com/wisec-downloads/agent
        chmod +x wisec-agent

    - name: Run Wisec Agent
      env:
        WISEC_PROJECT_ID: ${{ secrets.WISEC_PROJECT_ID }}
        AGENT_PRIVATE_KEY_HEX: ${{ secrets.AGENT_PRIVATE_KEY_HEX }}
        WISEC_API_ENDPOINT: ${{ secrets.WISEC_API_ENDPOINT }}
      run: |
        ./wisec-agent

Important Notes:

  • git Installation: The agent relies on git for collecting repository metadata. Ensure your runner image has git installed, or add a step to install it (sudo apt-get install -y git for Ubuntu-based runners).

  • --public-key parameter: The agent does NOT require a --public-key parameter. The public key is already registered with your Wisec instance when you generate the signing key pair from the dashboard. The API Gateway uses this registered public key to verify the agent's signature.

Gitleaks and Secret Scanning

The workflow example above includes steps to download and install gitleaks. The wisec-agent automatically detects gitleaks and uses it to scan your code for hardcoded secrets, which will appear as CRITICAL alerts in your dashboard.

To manage false positives, you can add a .gitleaksignore file to the root of your repository. For a detailed guide and an example file, please see the Secret Scanning section in our Quick Start guide.

Wisec Logo

Wisec

Wisec

Immutable storage traceability and AI anomaly detection for modern DevSecOps teams

Wisec Β© 2026 πŸ‡«πŸ‡·

French SaaS Badge
  • Privacy
  • Terms
  • Legal Mentions
  • Contact
French SaaS Badge