Security Engineer Experience
This page outlines how Security Engineers can use the StepSecurity platform to strengthen CI/CD security, monitor supply chain risk, and respond effectively to runtime threats in GitHub Actions environments.
Security Engineers typically rely on StepSecurity for four key workflows:
Integrating CI/CD telemetry into existing security operations
Reviewing third-party GitHub Actions for compromise risk
Searching packages for known malicious activity
Investigating StepSecurity alerts
Integration with SIEM
StepSecurity supports integrations with external platforms to enhance your security workflows, automate telemetry export, and streamline policy enforcement.
We currently support the following third party integrations:
S3 Integration: Export Harden-Runner insights and detections to S3
Webhook Integration: Send event data to SIEM platforms or custom pipelines
Slack OAuth Integration: Receive detection alerts and respond faster
Terraform Provider: Manage policies and integrations through infrastructure-as-code
Check out more about this feature here
Third Party Actions Review
Third-party GitHub Actions are one of the most common entry points for CI/CD supply chain attacks.
StepSecurity makes it easy to review and stay up to date with all third-party actions across your organization.
Explore the interactive demo to see how StepSecurity helps you continuously assess third-party action risk:
Learn more about this feature here
NPM Package Search
The NPM Package Search feature helps Security Engineers quickly identify where specific npm packages were introduced across pull requests, default branches and developer machines within their organization.
This is especially useful when responding to compromised or vulnerable dependencies, allowing teams to:
Trace affected pull requests
Understand the potential blast radius across repositories
Take targeted remediation actions
StepSecurity supports searches across the Node.js ecosystem, including npm, yarn, and pnpm dependency files.
Follow the interactive demo to see how NPM Package Search works in practice:
Learn more about this feature here
Investigating StepSecurity Alerts
Harden-Runner Detections
CI/CD runners handle sensitive secrets and production builds, but often lack the monitoring coverage of traditional endpoints. Harden-Runner fills this gap by providing runtime security tailored for GitHub Actions workflows.
When a detection is triggered, Security Engineers can use StepSecurity to:
Review the detection context and severity
Identify affected workflows, repositories, and outbound activity
Investigate suspicious behavior such as secret exfiltration, anomalous network calls, or source code tampering
Apply recommended policies and enforcement to prevent recurrence
Follow the interactive demo to see how detections are triaged and resolved:
Learn more about this feature here
Check Failures (GitHub Checks)
StepSecurity’s GitHub Checks feature brings CI/CD security signals directly into the pull request workflow, helping Security Engineers enforce controls before risky changes are merged.
These checks make it easy to:
Understand why a workflow or dependency change was blocked
Surface Harden-Runner detections and supply chain risks inside GitHub
Enforce security guardrails through required or optional merge checks
When a check fails, Security Engineers can quickly review the findings, validate whether the behavior is expected, and approve or remediate as needed.
This ensures security-driven failures are actionable, auditable, and integrated into the developer workflow.
Follow the interactive demo to see how failed checks are investigated and resolved:
Learn more about this feature here
Workflow Run Policies Failures
Workflow Run Policies allow you to enforce security controls by blocking GitHub Actions workflow runs that violate organization-defined policies. If your workflow run is cancelled and you see the message:
“The run was canceled by @stepsecurity-app[bot]”
it means the run violated a security policy configured by your StepSecurity administrator for your organization.
To understand the different scenarios where these policies may be triggered, explore the interactive demo below:
Learn more about this feature here
Threat Center Alerts
Threat Center is a dedicated hub in the StepSecurity dashboard that provides visibility into active supply chain compromises, historical threat insights, and actionable remediation guidance. Each alert includes direct links to detailed threat analysis so you can quickly understand impact and next steps.
When you receive an alert:
Open the StepSecurity dashboard.
Navigate to Artifact Security and select Threat Center from the dropdown menu.

Click on the most recent attack to review the full details.
In the alert page, locate the Remediation section and follow the recommended steps to address the issue.

By applying the provided remediation guidance, you can ensure your workflows remain secure against the reported threat.
Control Failures
StepSecurity provides security controls as targeted checks across your GitHub organization’s workflows, helping ensure compliance with industry-standard best practices.
When a workflow fails one of these controls, it indicates a configuration or behavior that does not meet the recommended security requirements.
For a complete overview of supported controls, refer to the full list

Most control failures can be resolved using Policy-Driven Pull Requests, which automatically generate guided fixes directly in your repository.
This interactive demo walks you through how to set up Policy-Driven PRs:
Last updated
Was this helpful?