{"payload":{"featured":[],"recommended":[],"recentlyAdded":[],"searchResults":{"results":[{"type":"repository_action","id":"1168903","name":"KSOC Image Scan","free":null,"primary_category":"Security","secondary_category":"Container CI","is_verified_owner":true,"slug":"ksoc-image-scan","owner_login":"ksoclabs","resource_path":"/marketplace/actions/ksoc-image-scan","highlights":{"description":"","name.ngram":""},"description":"KSOC scans for CVEs in your images as part of your GitHub Actions CI workflow\n","stars":4,"dependents_count":11,"icon_svg":"","repository_action":{"repository_action":{"id":1168903,"path":"action.yaml","name":"KSOC Image Scan","description":"KSOC scans for CVEs in your images as part of your GitHub Actions CI workflow","icon_name":"alert-triangle","color":"ffffff","featured":false,"repository_id":628952201,"rank_multiplier":1.0,"slug":"ksoc-image-scan","security_email":"pawel@ksoc.com"}}},{"type":"repository_action","id":"58744","name":"Bridgecrew Github Action","free":null,"primary_category":"Continuous integration","secondary_category":"Security","is_verified_owner":true,"slug":"bridgecrew-github-action","owner_login":"bridgecrewio","resource_path":"/marketplace/actions/bridgecrew-github-action","highlights":{"description":"","name.ngram":""},"description":"Find and fix security and compliance issues in infrastructure code using Bridgecrew Action\n","stars":72,"dependents_count":410,"icon_svg":"\n \n\n","repository_action":{"repository_action":{"id":58744,"path":"action.yml","name":"Bridgecrew Github Action","description":"Find and fix security and compliance issues in infrastructure code using Bridgecrew Action","icon_name":"shield","color":"6f42c1","featured":false,"repository_id":261123154,"rank_multiplier":1.0,"slug":"bridgecrew-github-action","security_email":"security@bridgecrew.io"}}},{"type":"repository_action","id":"1349711","name":"1Password CLI","free":null,"primary_category":"Security","secondary_category":null,"is_verified_owner":true,"slug":"1password-cli","owner_login":"1Password","resource_path":"/marketplace/actions/1password-cli","highlights":{"description":"","name.ngram":""},"description":"Install 1Password CLI in your pipeline\n","stars":27,"dependents_count":47,"icon_svg":"\n\n\n\n\n\t\n\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\n\t\t\n\t\t\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\n\t\n\n\n","repository_action":{"repository_action":{"id":1349711,"path":"action.yml","name":"1Password CLI","description":"Install 1Password CLI in your pipeline","icon_name":"lock","color":"ffffff","featured":false,"repository_id":644272408,"rank_multiplier":1.0,"slug":"1password-cli","security_email":"support@1password.com"}}},{"type":"repository_action","id":"2029057","name":"Corellium MATRIX","free":null,"primary_category":"Security","secondary_category":"Mobile CI","is_verified_owner":true,"slug":"corellium-matrix","owner_login":"corellium","resource_path":"/marketplace/actions/corellium-matrix","highlights":{"description":"","name.ngram":""},"description":"Automated mobile security testing and AppSec report generation, powered by Corellium virtual devices\n","stars":0,"dependents_count":1,"icon_svg":"\n \n \n\n","repository_action":{"repository_action":{"id":2029057,"path":"action.yml","name":"Corellium MATRIX","description":"Automated mobile security testing and AppSec report generation, powered by Corellium virtual devices","icon_name":"smartphone","color":"24292e","featured":false,"repository_id":765819011,"rank_multiplier":1.0,"slug":"corellium-matrix","security_email":"dan@corellium.com"}}},{"type":"repository_action","id":"181205","name":"SubFinder Action","free":null,"primary_category":"Security","secondary_category":"Testing","is_verified_owner":true,"slug":"subfinder-action","owner_login":"projectdiscovery","resource_path":"/marketplace/actions/subfinder-action","highlights":{"description":"","name.ngram":""},"description":"SubFinder is a passive subdomain discovery tool that discovers valid subdomains for websites\n","stars":16,"dependents_count":13,"icon_svg":"\n \n\n","repository_action":{"repository_action":{"id":181205,"path":"action.yaml","name":"SubFinder Action","description":"SubFinder is a passive subdomain discovery tool that discovers valid subdomains for websites","icon_name":"activity","color":"0366d6","featured":false,"repository_id":358603580,"rank_multiplier":1.0,"slug":"subfinder-action","security_email":"sandeep@projectdiscovery.io"}}},{"type":"repository_action","id":"809668","name":"Set CodeQL Languages","free":null,"primary_category":"Security","secondary_category":"Code Scanning Ready","is_verified_owner":true,"slug":"set-codeql-languages","owner_login":"advanced-security","resource_path":"/marketplace/actions/set-codeql-languages","highlights":{"description":"","name.ngram":""},"description":"Auto-populate the Actions matrix definition to include languages for CodeQL\n","stars":8,"dependents_count":37,"icon_svg":null,"repository_action":{"repository_action":{"id":809668,"path":"action.yml","name":"Set CodeQL Languages","description":"Auto-populate the Actions matrix definition to include languages for CodeQL","icon_name":null,"color":"24292e","featured":false,"repository_id":565945924,"rank_multiplier":1.0,"slug":"set-codeql-languages","security_email":"leftrightleft@github.com"}}},{"type":"repository_action","id":"1868824","name":"DesigniteJava Incremental Code Quality Analysis","free":null,"primary_category":"Code quality","secondary_category":"Code Scanning Ready","is_verified_owner":true,"slug":"designitejava-incremental-code-quality-analysis","owner_login":"DesigniteTools","resource_path":"/marketplace/actions/designitejava-incremental-code-quality-analysis","highlights":{"description":"","name.ngram":""},"description":"Identify code quality smells in new code and create new issues automatically to resolve the smells\n","stars":1,"dependents_count":1,"icon_svg":"\n \n \n \n\n","repository_action":{"repository_action":{"id":1868824,"path":"action.yml","name":"DesigniteJava Incremental Code Quality Analysis","description":"Identify code quality smells in new code and create new issues automatically to resolve the smells","icon_name":"bar-chart-2","color":"f66a0a","featured":false,"repository_id":742313183,"rank_multiplier":1.0,"slug":"designitejava-incremental-code-quality-analysis","security_email":"000.tushar@gmail.com"}}},{"type":"repository_action","id":"2169245","name":"Install roxctl","free":null,"primary_category":"Security","secondary_category":"Code Scanning Ready","is_verified_owner":true,"slug":"install-roxctl","owner_login":"stackrox","resource_path":"/marketplace/actions/install-roxctl","highlights":{"description":"","name.ngram":""},"description":"Download roxctl for use in GitHub Actions\n","stars":3,"dependents_count":4,"icon_svg":"\n\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n","repository_action":{"repository_action":{"id":2169245,"path":"action.yml","name":"Install roxctl","description":"Download roxctl for use in GitHub Actions","icon_name":null,"color":"24292e","featured":false,"repository_id":781456172,"rank_multiplier":1.0,"slug":"install-roxctl","security_email":"secalert@redhat.com"}}},{"type":"repository_action","id":"1166211","name":"CyberArk Conjur Secret Fetcher Action","free":null,"primary_category":"Security","secondary_category":null,"is_verified_owner":true,"slug":"cyberark-conjur-secret-fetcher-action","owner_login":"cyberark","resource_path":"/marketplace/actions/cyberark-conjur-secret-fetcher-action","highlights":{"description":"","name.ngram":""},"description":"Securely retrieve a secret from CyberArk Conjur Secrets Manager and present to your action as a masked environment\nvariable\n","stars":2,"dependents_count":7,"icon_svg":"\n \n \n\n","repository_action":{"repository_action":{"id":1166211,"path":"action.yml","name":"CyberArk Conjur Secret Fetcher Action","description":"Securely retrieve a secret from CyberArk Conjur Secrets Manager and present to your action as a masked environment variable","icon_name":"lock","color":"0366d6","featured":false,"repository_id":268637167,"rank_multiplier":1.0,"slug":"cyberark-conjur-secret-fetcher-action","security_email":"ismarc31@gmail.com"}}},{"type":"repository_action","id":"319144","name":"Tartufo Scan","free":null,"primary_category":"Security","secondary_category":null,"is_verified_owner":true,"slug":"tartufo-scan","owner_login":"godaddy","resource_path":"/marketplace/actions/tartufo-scan","highlights":{"description":"","name.ngram":""},"description":"Runs scan-local-repo with default options\n","stars":9,"dependents_count":13,"icon_svg":null,"repository_action":{"repository_action":{"id":319144,"path":"action.yml","name":"Tartufo Scan","description":"Runs scan-local-repo with default options","icon_name":null,"color":"ffd33d","featured":false,"repository_id":430811937,"rank_multiplier":1.0,"slug":"tartufo-scan","security_email":"sushantmimani"}}},{"type":"repository_action","id":"252565","name":"cloudposse-pre-commit","free":null,"primary_category":"Security","secondary_category":"Code quality","is_verified_owner":true,"slug":"cloudposse-pre-commit","owner_login":"cloudposse","resource_path":"/marketplace/actions/cloudposse-pre-commit","highlights":{"description":"","name.ngram":""},"description":"run pre-commit and optionally commit back to the pull request\n","stars":10,"dependents_count":31,"icon_svg":"\n \n\n","repository_action":{"repository_action":{"id":252565,"path":"action.yml","name":"cloudposse-pre-commit","description":"run pre-commit and optionally commit back to the pull request","icon_name":"activity","color":"0366d6","featured":false,"repository_id":401822967,"rank_multiplier":1.0,"slug":"cloudposse-pre-commit","security_email":"security@cloudposse.com"}}},{"type":"repository_action","id":"328716","name":"SecureStack Application Composition Analysis","free":null,"primary_category":"Security","secondary_category":"Code quality","is_verified_owner":true,"slug":"securestack-application-composition-analysis","owner_login":"SecureStackCo","resource_path":"/marketplace/actions/securestack-application-composition-analysis","highlights":{"description":"","name.ngram":""},"description":"Scan your source code in real-time for vulnerable libraries frameworks you are using. Supports Go, Python and Javascript\n","stars":21,"dependents_count":24,"icon_svg":"\n","repository_action":{"repository_action":{"id":328716,"path":"action.yml","name":"SecureStack Application Composition Analysis","description":"Scan your source code in real-time for vulnerable libraries & frameworks you are using. Supports Go, Python and Javascript","icon_name":"code","color":"ffffff","featured":false,"repository_id":433991149,"rank_multiplier":1.0,"slug":"securestack-application-composition-analysis","security_email":"mcsnet@yahoo.com"}}},{"type":"repository_action","id":"892233","name":"Orca Security - SCA / Secret Scanning","free":null,"primary_category":"Continuous integration","secondary_category":"Security","is_verified_owner":true,"slug":"orca-security-sca-secret-scanning","owner_login":"orcasecurity","resource_path":"/marketplace/actions/orca-security-sca-secret-scanning","highlights":{"description":"","name.ngram":""},"description":"Configures Orca CLI to run secret detection and/or vulnerabilities scanning\n","stars":2,"dependents_count":8,"icon_svg":"\n\n \n \n \n \n \n","repository_action":{"repository_action":{"id":892233,"path":"action.yaml","name":"Orca Security - SCA / Secret Scanning","description":"Configures Orca CLI to run secret detection and/or vulnerabilities scanning","icon_name":"shield","color":"ffffff","featured":false,"repository_id":579603927,"rank_multiplier":1.0,"slug":"orca-security-sca-secret-scanning","security_email":"lior@orca.security"}}},{"type":"repository_action","id":"1022849","name":"SBOM-generator-action","free":null,"primary_category":"Security","secondary_category":"Dependency management","is_verified_owner":true,"slug":"sbom-generator-action","owner_login":"advanced-security","resource_path":"/marketplace/actions/sbom-generator-action","highlights":{"description":"","name.ngram":""},"description":"Generates an SBOM from your repository dependency graph\n","stars":11,"dependents_count":44,"icon_svg":null,"repository_action":{"repository_action":{"id":1022849,"path":"action.yml","name":"SBOM-generator-action","description":"Generates an SBOM from your repository dependency graph","icon_name":null,"color":"d73a49","featured":false,"repository_id":604447198,"rank_multiplier":1.0,"slug":"sbom-generator-action","security_email":"jhutchings1@github.com"}}},{"type":"repository_action","id":"557281","name":"Orca Security - IaC Security","free":null,"primary_category":"Continuous integration","secondary_category":"Security","is_verified_owner":true,"slug":"orca-security-iac-security","owner_login":"orcasecurity","resource_path":"/marketplace/actions/orca-security-iac-security","highlights":{"description":"","name.ngram":""},"description":"Configures Orca CLI to run Infrastructure as Code security scans\n","stars":12,"dependents_count":16,"icon_svg":"\n\n \n \n \n \n \n","repository_action":{"repository_action":{"id":557281,"path":"action.yaml","name":"Orca Security - IaC Security","description":"Configures Orca CLI to run Infrastructure as Code security scans","icon_name":"shield","color":"ffffff","featured":false,"repository_id":502893345,"rank_multiplier":1.0,"slug":"orca-security-iac-security","security_email":"lior@orca.security"}}},{"type":"repository_action","id":"2177246","name":"poutine - GitHub Actions SAST","free":null,"primary_category":"Security","secondary_category":"Code Scanning Ready","is_verified_owner":true,"slug":"poutine-github-actions-sast","owner_login":"boostsecurityio","resource_path":"/marketplace/actions/poutine-github-actions-sast","highlights":{"description":"","name.ngram":""},"description":"BoostSecurity.io’s poutine detects vulnerabilities and misconfigurations in your GitHub Actions workflows.\n","stars":1,"dependents_count":3,"icon_svg":"\n \n \n \n \n\n","repository_action":{"repository_action":{"id":2177246,"path":"action.yml","name":"poutine - GitHub Actions SAST","description":"BoostSecurity.io’s poutine detects vulnerabilities and misconfigurations in your GitHub Actions workflows.\n","icon_name":"align-center","color":"ffd33d","featured":false,"repository_id":786633965,"rank_multiplier":1.0,"slug":"poutine-github-actions-sast","security_email":"francois@boostsecurity.io"}}},{"type":"repository_action","id":"2109976","name":"Load secrets from Dashlane","free":null,"primary_category":"Continuous integration","secondary_category":"Security","is_verified_owner":true,"slug":"load-secrets-from-dashlane","owner_login":"Dashlane","resource_path":"/marketplace/actions/load-secrets-from-dashlane","highlights":{"description":"","name.ngram":""},"description":"Inject secrets from your vault in a CI using the Dashlane CLI\n","stars":2,"dependents_count":null,"icon_svg":"\n \n \n\n","repository_action":{"repository_action":{"id":2109976,"path":"action.yml","name":"Load secrets from Dashlane","description":"Inject secrets from your vault in a CI using the Dashlane CLI","icon_name":"lock","color":"f66a0a","featured":false,"repository_id":765076649,"rank_multiplier":1.0,"slug":"load-secrets-from-dashlane","security_email":"security@dashlane.com"}}},{"type":"repository_action","id":"103014","name":"Synopsys Intelligent Security Scan","free":null,"primary_category":"Continuous integration","secondary_category":"Security","is_verified_owner":true,"slug":"synopsys-intelligent-security-scan","owner_login":"synopsys-sig","resource_path":"/marketplace/actions/synopsys-intelligent-security-scan","highlights":{"description":"","name.ngram":""},"description":"Initiate optimized SAST/SCA scans based on code changes and policy with filtered results for display in GitHub\n","stars":1,"dependents_count":969,"icon_svg":"\n \n\n","repository_action":{"repository_action":{"id":103014,"path":"action.yml","name":"Synopsys Intelligent Security Scan","description":"Initiate optimized SAST/SCA scans based on code changes and policy with filtered results for display in GitHub","icon_name":"shield","color":"6f42c1","featured":false,"repository_id":300409354,"rank_multiplier":1.0,"slug":"synopsys-intelligent-security-scan","security_email":"software-integrity-support@synopsys.com"}}},{"type":"repository_action","id":"25891","name":"Sysdig Secure Inline Scan","free":null,"primary_category":"Security","secondary_category":"Container CI","is_verified_owner":true,"slug":"sysdig-secure-inline-scan","owner_login":"sysdiglabs","resource_path":"/marketplace/actions/sysdig-secure-inline-scan","highlights":{"description":"","name.ngram":""},"description":"Perform image analysis on locally built container image and post the result of the analysis to Sysdig Secure\n","stars":27,"dependents_count":474,"icon_svg":"\n \n \n \n \n image/svg+xml\n \n \n \n \n sysdig_Vert_Color_Logo_RGB_MED\n \n \n \n \n \n \n \n \n sysdig_Vert_Color_Logo_RGB_MED\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n","repository_action":{"repository_action":{"id":25891,"path":"action.yml","name":"Sysdig Secure Inline Scan","description":"Perform image analysis on locally built container image and post the result of the analysis to Sysdig Secure","icon_name":"shield","color":"ffffff","featured":false,"repository_id":228705047,"rank_multiplier":1.0,"slug":"sysdig-secure-inline-scan","security_email":"airadier@gmail.com"}}},{"type":"repository_action","id":"537002","name":"Wait for secrets","free":null,"primary_category":"Security","secondary_category":"Publishing","is_verified_owner":true,"slug":"wait-for-secrets","owner_login":"step-security","resource_path":"/marketplace/actions/wait-for-secrets","highlights":{"description":"","name.ngram":""},"description":"Publish from GitHub Actions using multi-factor authentication\n","stars":274,"dependents_count":37,"icon_svg":"\n\n \n\n","repository_action":{"repository_action":{"id":537002,"path":"action.yml","name":"Wait for secrets","description":"Publish from GitHub Actions using multi-factor authentication","icon_name":"check-square","color":"ffffff","featured":false,"repository_id":498456330,"rank_multiplier":1.0,"slug":"wait-for-secrets","security_email":"varunsh@stepsecurity.io"}}}],"total":515,"totalPages":26},"categories":{"apps":[{"name":"API management","slug":"api-management","description_html":"

Structure your API infrastructure to enable various internet gateways to interact with your service.

\n"},{"name":"Backup Utilities","slug":"backup-utilities","description_html":"

Utilities providing periodic backups of your GitHub data

\n"},{"name":"Chat","slug":"chat","description_html":"

Bring GitHub into your conversations.

\n"},{"name":"Code quality","slug":"code-quality","description_html":"

Automate your code review with style, quality, security, and test‑coverage checks when you need them.

\n"},{"name":"Code review","slug":"code-review","description_html":"

Ensure your code meets quality standards and ship with confidence.

\n"},{"name":"Container CI","slug":"container-ci","description_html":"

Continuous integration for container applications.

\n"},{"name":"Continuous integration","slug":"continuous-integration","description_html":"

Automatically build and test your code as you push it to GitHub, preventing bugs from being deployed to production.

\n"},{"name":"Dependency management","slug":"dependency-management","description_html":"

Secure and manage your third-party dependencies.

\n"},{"name":"Deployment","slug":"deployment","description_html":"

Streamline your code deployment so you can focus on your product.

\n"},{"name":"Deployment Protection Rules","slug":"deployment-protection-rules","description_html":"

Enables custom protection rules to gate deployments with third-party services

\n"},{"name":"Game CI","slug":"game-ci","description_html":"

Tools for building a CI pipeline for game development

\n"},{"name":"IDEs","slug":"ides","description_html":"

Find the right interface to build, debug, and deploy your source code.

\n"},{"name":"Learning","slug":"learning","description_html":"

Get the skills you need to level up.

\n"},{"name":"Localization","slug":"localization","description_html":"

Extend your software's reach. Localize and translate continuously from GitHub.

\n"},{"name":"Mobile","slug":"mobile","description_html":"

Improve your workflow for the small screen.

\n"},{"name":"Mobile CI","slug":"mobile-ci","description_html":"

Continuous integration for Mobile applications

\n"},{"name":"Monitoring","slug":"monitoring","description_html":"

Monitor the impact of your code changes. Measure performance, track errors, and analyze your application.

\n"},{"name":"Project management","slug":"project-management","description_html":"

Organize, manage, and track your project with tools that build on top of issues and pull requests.

\n"},{"name":"Publishing","slug":"publishing","description_html":"

Get your site ready for production so you can get the word out.

\n"},{"name":"Recently added","slug":"recently-added","description_html":"

The latest tools that help you and your team build software better, together.

\n"},{"name":"Security","slug":"security","description_html":"

Find, fix, and prevent security vulnerabilities before they can be exploited.

\n"},{"name":"Support","slug":"support","description_html":"

Get your team and customers the help they need.

\n"},{"name":"Testing","slug":"testing","description_html":"

Eliminate bugs and ship with more confidence by adding these tools to your workflow.

\n"},{"name":"Utilities","slug":"utilities","description_html":"

Auxiliary tools to enhance your experience on GitHub

\n"}],"actions":[{"name":"API management","slug":"api-management","description_html":"

Structure your API infrastructure to enable various internet gateways to interact with your service.

\n"},{"name":"Backup Utilities","slug":"backup-utilities","description_html":"

Utilities providing periodic backups of your GitHub data

\n"},{"name":"Chat","slug":"chat","description_html":"

Bring GitHub into your conversations.

\n"},{"name":"Code quality","slug":"code-quality","description_html":"

Automate your code review with style, quality, security, and test‑coverage checks when you need them.

\n"},{"name":"Code review","slug":"code-review","description_html":"

Ensure your code meets quality standards and ship with confidence.

\n"},{"name":"Container CI","slug":"container-ci","description_html":"

Continuous integration for container applications.

\n"},{"name":"Continuous integration","slug":"continuous-integration","description_html":"

Automatically build and test your code as you push it to GitHub, preventing bugs from being deployed to production.

\n"},{"name":"Dependency management","slug":"dependency-management","description_html":"

Secure and manage your third-party dependencies.

\n"},{"name":"Deployment","slug":"deployment","description_html":"

Streamline your code deployment so you can focus on your product.

\n"},{"name":"Deployment Protection Rules","slug":"deployment-protection-rules","description_html":"

Enables custom protection rules to gate deployments with third-party services

\n"},{"name":"Game CI","slug":"game-ci","description_html":"

Tools for building a CI pipeline for game development

\n"},{"name":"GitHub Sponsors","slug":"github-sponsors","description_html":"

Tools to manage your GitHub Sponsors community

\n"},{"name":"IDEs","slug":"ides","description_html":"

Find the right interface to build, debug, and deploy your source code.

\n"},{"name":"Learning","slug":"learning","description_html":"

Get the skills you need to level up.

\n"},{"name":"Localization","slug":"localization","description_html":"

Extend your software's reach. Localize and translate continuously from GitHub.

\n"},{"name":"Mobile","slug":"mobile","description_html":"

Improve your workflow for the small screen.

\n"},{"name":"Mobile CI","slug":"mobile-ci","description_html":"

Continuous integration for Mobile applications

\n"},{"name":"Monitoring","slug":"monitoring","description_html":"

Monitor the impact of your code changes. Measure performance, track errors, and analyze your application.

\n"},{"name":"Project management","slug":"project-management","description_html":"

Organize, manage, and track your project with tools that build on top of issues and pull requests.

\n"},{"name":"Publishing","slug":"publishing","description_html":"

Get your site ready for production so you can get the word out.

\n"},{"name":"Security","slug":"security","description_html":"

Find, fix, and prevent security vulnerabilities before they can be exploited.

\n"},{"name":"Support","slug":"support","description_html":"

Get your team and customers the help they need.

\n"},{"name":"Testing","slug":"testing","description_html":"

Eliminate bugs and ship with more confidence by adding these tools to your workflow.

\n"},{"name":"Utilities","slug":"utilities","description_html":"

Auxiliary tools to enhance your experience on GitHub

\n"}]}},"title":"Marketplace"}