The Aguara GitHub Action scans your repository for security threats in AI agent skills and MCP server configurations, automatically uploads findings to GitHub Code Scanning, and can fail builds based on severity thresholds.Documentation Index
Fetch the complete documentation index at: https://mintlify.com/garagon/aguara/llms.txt
Use this file to discover all available pages before exploring further.
Quick Start
Add to.github/workflows/security.yml:
Inputs
All inputs are optional. The action is defined inaction.yml.
| Input | Default | Description |
|---|---|---|
path | ./ | Path to scan (file or directory) |
severity | info | Minimum severity to report: critical, high, medium, low, info |
fail-on | (none) | Exit with code 1 if findings at or above this severity are found |
format | sarif | Output format: sarif, json, terminal, markdown |
output | aguara-results.sarif | Output file path |
verbose | false | Show rule descriptions and confidence scores |
rules | (none) | Additional custom rules directory |
disable-rule | (none) | Comma-separated rule IDs to disable |
max-file-size | (50MB) | Maximum file size to scan (e.g. 100MB) |
version | (latest) | Pin a specific Aguara version (e.g. v0.5.0) |
upload-sarif | true | Upload SARIF results to GitHub Code Scanning |
Outputs
| Output | Description |
|---|---|
findings-count | Number of security findings detected |
exit-code | Exit code from the aguara scan command |
Examples
Scan specific directory with severity threshold
./mcp-server/, reports findings at medium severity or above, and fails the build if high or critical findings are detected.
Scan with custom rules
./custom-rules/ and disables specific built-in rules.
Pin a specific version
JSON output without SARIF upload
Verbose output with all findings
Use findings count in subsequent steps
SARIF Upload Setup
Permissions
SARIF upload requires thesecurity-events: write permission:
Private repositories
GitHub Code Scanning is free for public repositories. For private repositories, you need:- GitHub Advanced Security enabled
- A GitHub Enterprise Cloud or GitHub Enterprise Server license
Viewing results
Once uploaded, findings appear in:- Security tab → Code scanning alerts
- Pull request checks (if findings match changed lines)
- Commit status checks
Complete Workflow Example
- Runs on pushes, pull requests, and weekly
- Scans
.claude/skills/for medium+ findings - Fails on high/critical findings
- Uploads SARIF to Code Scanning
- Saves SARIF as a workflow artifact
- Comments on PRs when findings are detected
Manual Installation
If you prefer not to use the action, install and run Aguara manually:Troubleshooting
SARIF upload fails with 403
Ensuresecurity-events: write permission is set:
No findings appear in Code Scanning
Check:- SARIF file was created:
ls -lh aguara-results.sarif - Upload step succeeded: check workflow logs
- You have Advanced Security (for private repos)
Action fails but local scan works
The action runs with--no-color and --no-update-check by default. Test locally:
Next Steps
GitLab CI
Integrate with GitLab CI/CD pipelines
Docker
Run Aguara in Docker containers
