Quick start
Follow the simple guide below to integrate security monitoring into your GitHub actions workflows.
Last updated
Follow the simple guide below to integrate security monitoring into your GitHub actions workflows.
Last updated
Sign in to with your GitHub account. The first time you sign in, we automatically create your Organization and a default Project.
From your Project’s “Settings” page, copy the API Key. Keep this secret.
You will add this as a secret in your GitHub repo for actions.
• Add your API key as a GitHub Secret (e.g., LISTEN_API_KEY).
• In your repo’s .github/workflows/<your-workflow>.yml
, add a step:
On your next PR, listen.dev runs automatically. If malicious DNS calls are detected, you’ll see a PR comment and get a Slack alert.
Typical practice is running listen.dev on Pull Request triggers in GitHub, where you have rest of your checks
In-line results can be received in GitHub PR comments and in Slack (see below)
Detailed results can be seen In dashboard.listen.dev
• Go to your Slack workspace and set up an Incoming Webhook.
• Paste the Slack Webhook URL into your Project’s “Slack Integration” field on listen.dev.
See detailed guide for this here.
Woot! you just completed your first e2e workflow in listen.dev!