Overview
Connect Snyk to Continue Mission Control to enable agents to automatically detect, analyze, and resolve security vulnerabilities. When Snyk is enabled, Continue can generate PRs to fix vulnerabilities, analyze security patterns, and maintain application security posture.What You Can Do with Snyk Integration
- Automatically generate PRs to fix security vulnerabilities
- Analyze dependency risks and suggest updates
- Monitor security posture across projects
- Create detailed vulnerability reports with remediation steps
- Track vulnerability trends and compliance status
Setup
1
Navigate to Integrations
Go to your Integrations Settings.
2
Connect Snyk
Click “Connect” next to Snyk integration.
3
Authorize with Snyk
Click the “Connect with Snyk” button to authorize Continue Mission Control:
- You’ll be redirected to Snyk’s OAuth authorization page
- Review and approve the requested permissions
- You’ll be automatically redirected back to the Snyk inbox view
4
Verify Connection
Once redirected back, you’ll see:
- A confirmation that Snyk is connected
- Your Snyk projects available for monitoring
- Any active vulnerability alerts
OAuth Authorization: No manual token configuration needed! Simply click the authorization button and Continue will securely handle the authentication flow with Snyk.
Use Cases
Code Vulnerability Scanning (SAST)
Scan your source code for security vulnerabilities:Code Security Agent
Task Example: “Run a Snyk Code scan on this repo with severity threshold medium. Summarize issues with file:line locations and propose minimal fixes for the top 3 critical issues.”What the Agent Does:
- Performs static application security testing on your code
- Identifies security vulnerabilities with exact file and line numbers
- Prioritizes issues by severity and exploitability
- Generates minimal, targeted fixes for critical issues
- Re-runs scans to verify fixes resolve the vulnerabilities
Dependency Scanning (SCA)
Check open source dependencies for known vulnerabilities:Dependency Security Agent
Task Example: “Run Snyk Open Source scan including dev dependencies. Summarize vulnerable dependency paths and propose a minimal-risk upgrade plan.”What the Agent Does:
- Performs software composition analysis on all dependencies
- Maps vulnerability paths through dependency tree
- Identifies minimal-risk upgrade strategies
- Creates dependency update plans with compatibility checks
- Re-tests after proposed changes to confirm resolution
Infrastructure as Code (IaC) Security
Scan Terraform, CloudFormation, and Kubernetes configs:IaC Security Agent
Task Example: “Scan ./infra directory with Snyk IaC. Report high/critical misconfigurations with exact files and lines. Provide corrected configurations.”What the Agent Does:
- Scans infrastructure code for security misconfigurations
- Identifies exposed secrets and overly permissive policies
- Reports exact file locations and line numbers
- Provides secure configuration alternatives
- Re-scans to confirm misconfigurations are resolved
Container Security Scanning
Analyze Docker images for vulnerabilities:Container Security Agent
Task Example: “Scan Docker image my-api:latest excluding base image vulnerabilities. Show dependency tree and recommend safer base images.”What the Agent Does:
- Scans container images for OS and application vulnerabilities
- Analyzes complete dependency tree in containers
- Recommends security-hardened base images
- Creates optimized Dockerfiles with security improvements
- Re-tests after changes to verify vulnerability reduction
Pull Request Security Scanning
Focus scanning on modified files:PR Security Agent
Task Example: “Scan only files changed since origin/main with Snyk Code. Block if new high severity issues would be introduced.”What the Agent Does:
- Targets security scanning to changed files only
- Compares security posture before and after changes
- Identifies newly introduced vulnerabilities
- Shows security impact delta for the PR
- Blocks merge if critical issues are detected
Security Learning Integration
Access contextual security education:Security Education Agent
Task Example: “Open Snyk Learn lessons related to the top CWE vulnerabilities from this scan.”What the Agent Does:
- Maps vulnerabilities to Common Weakness Enumeration (CWE) categories
- Retrieves relevant Snyk Learn educational content
- Provides contextual security training based on actual issues
- Links to remediation guides and best practices
- Tracks security knowledge gaps across the team
Running Snyk Agents in Mission Control
You can run Snyk-connected agents in two ways:1. Manual Tasks
Trigger agents on-demand for vulnerability analysis:- Go to Mission Control Agents
- Select or create a Snyk-enabled agent
- Click “Run Agent” and provide your task description
- Monitor progress and review results in real-time
- “Scan all projects for critical vulnerabilities and prioritize fixes”
- “Update all npm dependencies with known vulnerabilities”
- “Generate a security report for the last sprint”
2. Automated Workflows
Set up agents to run automatically:- Webhook-triggered: Execute when new vulnerabilities are detected
- Scheduled: Run daily or weekly security scans
- PR-triggered: Scan new dependencies before merge
Integration with GitHub
Combine Snyk with GitHub integration for a complete security workflow:1
Connect Both Integrations
Enable both Snyk and GitHub integrations in Mission Control
2
Create a Security Agent
Build an agent that:
- Receives Snyk vulnerability alerts
- Analyzes the security issue in your codebase
- Creates a PR with the security fix
- Adds security impact analysis to the PR
3
Set Up Automated Security Workflow
Configure the agent to run automatically on new critical vulnerabilities
Monitoring Agent Activity
Track your agent’s security remediation performance:- View in Inbox: Navigate to the Snyk view to see all Snyk-related agent activity
- Check Snyk Dashboard: Verify that vulnerabilities are being addressed
- Review PRs: Ensure quality and security of generated fixes
- Monitor Metrics: Track mean time to remediation (MTTR) and fix rate
Troubleshooting
OAuth authorization fails
OAuth authorization fails
Projects not appearing
Projects not appearing
Problem: Snyk projects aren’t visible after connectionSolutions:
- Verify you have access to projects in Snyk
- Check that projects are properly imported in Snyk
- Refresh the integration connection
- Ensure the OAuth scope includes project access
Agent can't access vulnerability data
Agent can't access vulnerability data
Problem: Agent returns errors when trying to fetch Snyk dataSolutions:
- Verify the OAuth connection is still valid
- Re-authorize if the token has expired
- Check that the agent has the necessary Snyk context provider
- Review agent logs for specific error messages
Webhooks not triggering
Webhooks not triggering
Problem: Agent isn’t running when new vulnerabilities are foundSolutions:
- Verify webhook configuration in Snyk settings
- Check that webhook URL points to Continue Mission Control
- Ensure webhook events include vulnerability detection
- Review webhook delivery logs in Snyk