- 
                Notifications
    You must be signed in to change notification settings 
- Fork 1
Split GitHub integration into Cloud Security and Code Security; document permissions update for Code Security #38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
…ent permissions update for Code Security
| The latest updates on your projects. Learn more about Vercel for GitHub. 
 | 
| WalkthroughAdds a new GitHub (Code Security) documentation page and renames/updates the existing GitHub page to GitHub (Cloud Security), refining setup text, permission scopes, monitored resources, and adding dated Updates noting new permission requirements and upcoming CI check support. Changes
 Sequence Diagram(s)sequenceDiagram
    participant User as GitHub User/PR
    participant GitHub as GitHub API
    participant Service as Cloud/Code Security Integration
    participant CI as CI checks (on PR)
    rect rgb(230, 245, 255)
    Note over User,Service: New CI check support (2025-10-14)
    end
    User->>GitHub: Open PR / push commit
    GitHub->>Service: Webhook (pull_request / check_run) [requires Checks & PR scopes]
    alt CI check enabled
        Service->>CI: Trigger/validate Code Security check
        CI->>GitHub: Report check status
        GitHub->>Service: Check result callback
    else No CI check
        Service->>GitHub: Read PR metadata (requires metadata/contents scopes)
    end
    Service->>User: Surface findings / statuses in UI
Estimated code review effort🎯 2 (Simple) | ⏱️ ~10 minutes Poem
 Pre-merge checks and finishing touches❌ Failed checks (1 warning)
 ✅ Passed checks (2 passed)
 ✨ Finishing touches🧪 Generate unit tests (beta)
 📜 Recent review detailsConfiguration used: CodeRabbit UI Review profile: CHILL Plan: Pro Knowledge base: Disabled due to  📒 Files selected for processing (2)
 🧰 Additional context used🪛 LanguageToolpages/integrations/github-code-security.mdx[grammar] ~17-~17: There might be a mistake here. (QB_NEW_EN) [grammar] ~18-~18: There might be a mistake here. (QB_NEW_EN) [grammar] ~19-~19: There might be a mistake here. (QB_NEW_EN) [grammar] ~32-~32: There might be a mistake here. (QB_NEW_EN) pages/integrations/github.mdx[grammar] ~17-~17: There might be a mistake here. (QB_NEW_EN) [grammar] ~18-~18: There might be a mistake here. (QB_NEW_EN) [grammar] ~19-~19: There might be a mistake here. (QB_NEW_EN) [grammar] ~20-~20: There might be a mistake here. (QB_NEW_EN) [grammar] ~21-~21: There might be a mistake here. (QB_NEW_EN) [grammar] ~22-~22: There might be a mistake here. (QB_NEW_EN) [grammar] ~29-~29: There might be a mistake here. (QB_NEW_EN) [grammar] ~30-~30: There might be a mistake here. (QB_NEW_EN) [grammar] ~31-~31: There might be a mistake here. (QB_NEW_EN) Comment  | 
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 3
📜 Review details
Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro
Knowledge base: Disabled due to Reviews -> Disable Knowledge Base setting
📒 Files selected for processing (2)
- pages/integrations/github-code-security.mdx(1 hunks)
- pages/integrations/github.mdx(1 hunks)
🧰 Additional context used
🪛 LanguageTool
pages/integrations/github.mdx
[grammar] ~17-~17: There might be a mistake here.
Context: ... on GitHub:  - Repository administration - Repository Dependabot alerts - Repositor...
(QB_NEW_EN)
[grammar] ~18-~18: There might be a mistake here.
Context: ...istration - Repository Dependabot alerts - Repository metadata - Repository webhook...
(QB_NEW_EN)
[grammar] ~19-~19: There might be a mistake here.
Context: ... Dependabot alerts - Repository metadata - Repository webhooks - Organization admin...
(QB_NEW_EN)
[grammar] ~20-~20: There might be a mistake here.
Context: ...epository metadata - Repository webhooks - Organization administration - Organizati...
(QB_NEW_EN)
[grammar] ~21-~21: There might be a mistake here.
Context: ...y webhooks - Organization administration - Organization members - Organization webh...
(QB_NEW_EN)
[grammar] ~22-~22: There might be a mistake here.
Context: ...on administration - Organization members - Organization webhooks  ### Which resourc...
(QB_NEW_EN)
[grammar] ~29-~29: There might be a mistake here.
Context: ...he following on GitHub:  - Organizations - Repositories   - Branch protection rules...
(QB_NEW_EN)
[grammar] ~30-~30: There might be a mistake here.
Context: ... GitHub:  - Organizations - Repositories   - Branch protection rules   - Dependabot a...
(QB_NEW_EN)
[grammar] ~31-~31: There might be a mistake here.
Context: ...Repositories   - Branch protection rules   - Dependabot alerts  ## Common Issues  ###...
(QB_NEW_EN)
pages/integrations/github-code-security.mdx
[grammar] ~17-~17: There might be a mistake here.
Context: ...on GitHub:  - Repository metadata (read) - Repository contents (read) - Repository ...
(QB_NEW_EN)
[grammar] ~18-~18: There might be a mistake here.
Context: ...data (read) - Repository contents (read) - Repository checks (read and write) - Rep...
(QB_NEW_EN)
[grammar] ~19-~19: There might be a mistake here.
Context: ...ad) - Repository checks (read and write) - Repository pull requests (read and write...
(QB_NEW_EN)
[grammar] ~32-~32: There might be a mistake here.
Context: ...ite access to Checks on repositories - Read and write access to **Pull requests...
(QB_NEW_EN)
Problem
We need a permissions update for GitHub (Code Security) to enable PR checks.
Solution
Document it here.
I've also split out the two GitHub integrations for Cloud Security and Code Security, to match what we have on the platform. I left the slug as-is for Cloud Security to avoid breaking links.
Summary by CodeRabbit