Skip to content

Security Findings

Shoehorn tracks security findings for entities in your catalog, aggregating vulnerability data and security posture information.

Finding TypeSourceDescription
Dependabot alertsGitHubVulnerable dependency versions
CodeQL findingsGitHubStatic analysis security issues
Secret scanningGitHubExposed secrets in code
Custom findingsAPIManually reported vulnerabilities

Navigate to an entity detail page to see its security posture:

  • Active vulnerability count by severity
  • Whether security tools are enabled
  • Recent finding history

The security scorecard category evaluates:

RulePointsWhat’s Checked
dependabot-enabled5Dependabot is active on the repository
codeql-enabled5CodeQL scanning is configured
secret-scanning5Secret scanning is enabled
no-critical-vulns5No unresolved critical/high vulnerabilities

Security findings can automatically create governance actions:

  • Critical vulnerabilities create critical priority actions
  • High vulnerabilities create high priority actions
  • Actions are assigned to the entity’s owning team
  • SLA timers track remediation progress

For optimal security posture in your organization:

  1. Enable Dependabot on all repositories
  2. Configure CodeQL for supported languages
  3. Enable secret scanning with push protection
  4. Review findings regularly via the governance dashboard
  5. Set SLA targets for vulnerability remediation