Skip to main content
Open Source Free MIT License

SecureOps

Secrets leak into repos, vulnerabilities hide in dependencies, and misconfigurations slip through reviews — all before anyone notices.

Automated security scanning for every push, every PR

SecureOps is a free, open-source GitHub Action that performs automated security scanning on repositories. It detects secrets, vulnerabilities, and misconfigurations using Gitleaks, Trivy, and OSV-Scanner. Generates multi-format reports and integrates with GitHub Security tab. Available on GitHub at github.com/cloudon-one/git-security-scanner-public.

Core Features

Secret Detection

Catch exposed API keys, passwords, and tokens before they reach production.

  • Powered by Gitleaks v8.28.0
  • Custom rule definitions via TOML configuration
  • Token masking in reports (first/last 4 chars)
  • Supports pre-commit and CI/CD scanning

Vulnerability Scanning

Find CVEs and security issues in dependencies and infrastructure code.

  • Trivy v0.65.0 for CVE and misconfiguration detection
  • OSV-Scanner v2.2.1 for open source vulnerability identification
  • Scans application dependencies, container images, and IaC
  • Fail-on-critical build policies

Rich Reporting

Actionable reports in multiple formats, integrated directly into your GitHub workflow.

  • JSON, HTML, and SARIF output formats
  • Automated PR comments with severity breakdown
  • GitHub Security tab integration via SARIF upload
  • Multi-factor risk scoring and assessment

How It Works

01

Add the GitHub Action

Add SecureOps to your workflow YAML with a single step. Configure scan type, fail thresholds, and reporting options.

02

Scan on Every Push

SecureOps runs automatically on pushes and pull requests, scanning for secrets, vulnerabilities, and misconfigurations.

03

Review Findings

Findings appear as PR comments with severity levels and remediation guidance. Critical issues can block merges.

04

Org-Wide Audits

Run scheduled scans across your entire GitHub organization with consolidated dashboards and Slack summaries.

Why Choose SecureOps?

Shift-Left Security

Catch security issues in development, not production. Automated scanning on every commit prevents secrets from ever reaching your main branch.

Zero Configuration Start

Works out of the box with sensible defaults. Just add the action to your workflow and start scanning immediately.

Supply Chain Security

SHA256 checksum verification prevents tool tampering. Non-root container execution and minimal attack surface.

Developer-Friendly

Findings appear directly in PR comments with severity, context, and remediation guidance. No context switching to external dashboards.

Tech Stack

GitHub Actions Python Docker Gitleaks v8.28.0 Trivy v0.65.0 OSV-Scanner v2.2.1 SARIF

Frequently Asked Questions

How do I add SecureOps to my repository?
Add a single step to your GitHub Actions workflow: uses: cloudon-one/git-security-scanner@v2 with github_token and fail_on_critical options. It works out of the box with sensible defaults.
What types of security issues does SecureOps detect?
SecureOps detects three categories: secrets (API keys, tokens, passwords via Gitleaks), vulnerabilities (CVEs in dependencies via Trivy and OSV-Scanner), and infrastructure misconfigurations (in Terraform, Kubernetes manifests, etc.).
Can SecureOps scan my entire GitHub organization?
Yes. SecureOps supports organization-wide scanning with consolidated dashboards and Slack integration for summary reports across all your repositories.
Is SecureOps free for private repositories?
Yes, SecureOps is fully open source under the MIT license and works with both public and private GitHub repositories at no cost.
What report formats are supported?
SecureOps generates JSON (machine-readable), interactive HTML (human-readable), and SARIF (GitHub Security tab integration) reports.

Run SecureOps in your environment.

Clone the repo and deploy with Terraform — or book an engineering call for hands-on help adapting it to your stack.