Habilidades reviewdog
🔍

reviewdog

Seguro ⚙️ Comandos externos🔑 Variáveis de ambiente

Add automated security code review to CI/CD pipelines

Security scanning results are scattered across CI logs and missed by reviewers. Reviewdog aggregates findings from multiple security tools into inline pull request comments, making vulnerabilities visible where developers work.

Suporta: Claude Codex Code(CC)
🥉 76 Bronze
1

Baixar o ZIP da skill

2

Upload no Claude

Vá em Configurações → Capacidades → Skills → Upload skill

3

Ative e comece a usar

Testar

A utilizar "reviewdog". Add reviewdog security scanning with Semgrep and Bandit to my CI pipeline

Resultado esperado:

  • Created GitHub Actions workflow with multi-tool security scanning
  • Configured Semgrep to run with ERROR severity and fail on critical findings
  • Added Bandit Python security scanner as secondary check
  • Set up filter-mode=added to show only new issues in PR diff
  • Configured reviewdog to post comments as github-pr-review
  • Files generated: .github/workflows/security-review.yml, .reviewdog.yml

A utilizar "reviewdog". Set up pre-commit hooks for security scanning with gitleaks and hadolint

Resultado esperado:

  • Created pre-commit configuration with reviewdog integration
  • Added gitleaks secret detection hook running with local reporter
  • Added hadolint Dockerfile scanning hook
  • Configured error-level findings to fail the commit check
  • Installed pre-commit hooks to local repository

A utilizar "reviewdog". Configure reviewdog for GitLab CI with Checkov and ShellCheck

Resultado esperado:

  • Generated GitLab CI configuration with reviewdog integration
  • Added Checkov Terraform security scanning stage
  • Added ShellCheck for shell script validation
  • Configured mr-discussion reporter for merge request comments
  • Set up filter-mode=diff_context to show only changed files

Auditoria de Segurança

Seguro
v5 • 1/16/2026

Documentation-only skill containing CI/CD templates and reference materials for reviewdog security integration. All static findings are false positives from legitimate DevSecOps documentation. The skill describes running security scanners (Semgrep, Bandit, Gitleaks) and posting results to PRs - this is standard, documented CI/CD behavior using properly secured token management via GitHub/GitLab secrets.

8
Arquivos analisados
2,348
Linhas analisadas
2
achados
5
Total de auditorias
Auditado por: claude Ver Histórico de Auditoria →

Pontuação de qualidade

59
Arquitetura
100
Manutenibilidade
87
Conteúdo
21
Comunidade
100
Segurança
100
Conformidade com especificações

O Que Você Pode Construir

Enforce security standards in PRs

Configure reviewdog to block merges when critical vulnerabilities are detected, ensuring security gates are never bypassed.

Automate security feedback loops

Add security scanning to CI pipelines that posts findings directly to pull requests, reducing time to remediation.

Catch issues before merge

Get inline security annotations on vulnerable code patterns during code review, with links to CWE references.

Tente Estes Prompts

Basic reviewdog setup
Set up reviewdog in my GitHub Actions workflow to run Semgrep with error-level findings posted as PR review comments
Multi-tool scanning
Create a reviewdog configuration that runs Bandit for Python, Gitleaks for secrets, and Checkov for IaC security in parallel
Severity filtering
Configure reviewdog to only show new security issues introduced in the PR and fail the build for critical findings
Custom security rules
Add a custom grep-based security check to my reviewdog configuration that detects dangerous function usage like eval() and exec()

Melhores Práticas

  • Use fail-on-error=true for critical severity findings to block vulnerable code from merging
  • Configure filter-mode=added or diff_context to reduce noise from existing issues
  • Store API tokens in CI secrets (GITHUB_TOKEN, GITLAB_TOKEN) rather than hardcoding

Evitar

  • Running reviewdog without filter-mode on large repositories creates overwhelming comment volume
  • Using personal access tokens instead of CI service tokens with excessive permissions
  • Skipping baseline files for existing vulnerabilities creates noise when starting adoption

Perguntas Frequentes

What CI platforms does reviewdog support?
GitHub Actions, GitLab CI, CircleCI, Jenkins, Azure Pipelines, Bitbucket Pipelines, and Gerrit. Each has specific reporter formats.
Which security tools integrate with reviewdog?
Semgrep, Bandit, Gitleaks, Checkov, Hadolint, Trivy, ShellCheck, ESLint, tfsec, and 30+ additional linters and scanners.
Does reviewdog require network access?
Only when posting comments to PRs via github-pr-review or similar reporters. Local reporter works offline.
How is sensitive data handled?
Security tool output (including potential secrets) is piped to reviewdog and posted as PR comments. Use --no-git flag for gitleaks to avoid scanning git history.
Why are no comments appearing on my PR?
Common causes: missing API token permissions, running on main branch instead of PR, filter-mode too restrictive, or reviewdog not in PR context.
How is this different from running security tools directly?
Reviewdog aggregates results from multiple tools into unified inline comments, provides diff-aware filtering, and integrates with PR workflows natively.