Sample Detection Events

Each detection event is streamed in real time with rich metadata about the workflow, job, detection type, and offending artifacts.

S3 and WebHook Integrations

The following detection types are currently supported for both S3 and Webhook integrations. Each example shows a representative payload.

Threat-Intelligence

This will be found in the threat-intel folder for S3

{
  "id": "78540701-3106-4eaa-9408-8902e87bd27d",
  "event_id": "78540701-3106-4eaa-9408-8902e87bd27d",
  "type": "Threat-Intelligence",
  "incident_start_time": "2025-09-15T22:41:00Z",
  "title": "Tinycolor NPM Supply Chain Attack - 40+ Packages Compromised with Credential Harvester",
  "details": "# Tinycolor NPM Supply Chain Attack - 40+ Packages Compromised\n\n## Executive Summary\n\nA malicious update to @ctrl/tinycolor (2.2M weekly downloads) was detected on npm as part of a broader supply-chain attack that impacted more than ...",
  "ecosystem": "npm",
  "description": "A malicious update to @ctrl/tinycolor (2.2M weekly downloads) was detected on npm as part of a broader supply-chain attack that impacted more than 40 packages spanning...",
  "severity": "HIGH",
  "is_active": "true",
  "incident_url": "https://app.stepsecurity.io/github/your-org/threat-center/incidents/78540701-3106-4eaa-9408-8902e87bd27d"
}

Action-Uses-Commit-From-Non-Default-Branch

Action-Uses-Imposter-Commit

Domain-Blocked

HTTPS-Outbound-Network-Call

New-Outbound-Network-Call

Privileged-Container

Reverse-Shell

Runner-Worker-Memory-Read

Secret-In-Build-Log

Secret-In-Artifact

Source-Code-Overwritten

Actions-Policy-Blocked

Runs-On-Policy-Blocked

Secrets-Policy-Blocked

Compromised-Actions-Policy-Blocked

Lockdown Detection Event

For a lockdown detection event, the is_lockdown key is set to true. Lockdown mode supports the following detection types:

  • Privileged-Container

  • Reverse-Shell

  • Runner-Worker-Memory-Read

Last updated

Was this helpful?