GitHub Actions
Secure your CI/CD pipelines with runtime monitoring.Why monitor CI/CD?
- Supply chain attacks in build processes
- Malicious dependencies during package installs
- Crypto miners using free compute
- Credential theft from CI/CD environments
Setup (2 minutes)
1. Get API token
2. Add to workflow
3. Add secret
- Go to repository Settings → Secrets → Actions
- Click “New repository secret”
- Name:
GARNET_API_TOKEN
- Value: Your API token
- Click “Add secret”

4. Trigger workflow
Configuration
Scan modes
- Comprehensive (Recommended)
- Lightweight
- Full process execution
- Network activity
- File system operations
- Dependency analysis
Advanced options
What gets detected
Supply Chain
- Malicious packages
- Backdoored dependencies
- Build tool compromises
Crypto Mining
- Mining software
- Pool connections
- Resource abuse
Data Theft
- Network exfiltration
- Credential harvesting
- Secret extraction
Code Injection
- Malicious scripts
- Build manipulation
- Unauthorized changes
Verification
After setup:- Trigger workflow - push code or create PR
- Check logs - look for Garnet scan output
- Visit dashboard - confirm agent appears
- Review events - check for any detections

Example detections
Crypto miner blocked
Suspicious network connection
Troubleshooting
Scan step fails
Scan step fails
Symptoms:Fix:
- Verify
GARNET_API_TOKEN
secret is set - Check token permissions in dashboard
- Ensure runner has internet access
No detections appear
No detections appear
This is normal if no threats exist.Test:If still nothing:
- Confirm agent shows “online” in dashboard
- Check scan-mode configuration
- Review workflow logs for errors
Performance impact
Performance impact
Symptoms: Build takes longerSolutions:
- Switch to
scan-mode: lightweight
- Run scans only on specific branches:
- Use matrix builds for parallelization
False positives
False positives
Symptoms: Legitimate activity flaggedFix: Add to ignore patterns:Or create allowlist in dashboard