Executed + Snyk Collector
Enforce Executed using data collected by Snyk Collector. Automatically check security and compliance standards on every PR.
How Snyk Collector Powers This Guardrail
The Snyk Collector gathers metadata from your systems. This data flows into Lunar's Component JSON, where the Executed guardrail evaluates it against your standards.
When enabled, this check runs automatically on every PR and in AI coding workflows, providing real-time enforcement with actionable feedback.
Quick Start Configuration
Add both the collector and policy to your lunar-config.yml to enable this guardrail.
# Step 1: Enable the Snyk Collector
collectors:
- uses: github://earthly/lunar-lib/collectors/snyk@v1.0.0
# with: ...
# Step 2: Enable the Container Scan Guardrails
policies:
- uses: github://earthly/lunar-lib/policies/container-scan@v1.0.0
include: [executed]
# with: ...
What Snyk Collector Collects
This collector gathers the following data that the Executed guardrail evaluates.
github-app
Detects Snyk GitHub App scans on pull requests by querying GitHub commit status API. Waits for scan completion and captures results. Categorizes by scan type (Open Source, Code, Container, IaC).
running-in-prs
Proves Snyk is running on PRs by querying Lunar Hub for Snyk data from recent PRs. Used on the default branch to provide compliance proof that PR scanning is happening (since Snyk GitHub App only posts checks on PRs, not directly on the default branch).
cli
Detects Snyk CLI executions in CI pipelines. Captures the command and exit code, then categorizes by subcommand (test, code, container, iac).
Example Data Flow
Here's an example of the data that Snyk Collector writes to the Component JSON, which Executed then evaluates.
{
"sca": {
"running_in_prs": true,
"source": {
"tool": "snyk",
"version": "1.1200.0",
"integration": "github_app"
},
"native": {
"snyk": {
"github_app": {
"state": "success",
"context": "security/snyk",
"target_url": "https://app.snyk.io/..."
},
"cicd": {
"cmds": [
{"cmd": "snyk test --all-projects", "version": "1.1200.0"}
]
}
}
}
}
}
Configuration Options
Container Scan Guardrails Inputs
| Input | Required | Default | Description |
|---|---|---|---|
min_severity |
Optional |
high
|
Minimum severity to fail on (critical, high, medium, low) |
max_total_threshold |
Required | — | Maximum total findings allowed (must be configured) |
Ready to Automate Your Standards?
See how Lunar can turn your engineering wiki, compliance docs, or postmortem action items into automated guardrails with our 100+ built-in guardrails.