Snyk — market leader (2016) for dependency + container + IaC security scanning. Free tier: 100 tests/mo. 2026 competitors: GitHub Dependabot (free, native), Semgrep (open-source SAST), Trivy (containers). Setup: npm install -g snyk → snyk auth → snyk test. CI: snyk GitHub Action, fail build on > high severity.
Below: step-by-step, working examples, common pitfalls, FAQ.
npm install -g snyk — install CLI globallysnyk auth — link CLI to your accountsnyk test in repo root — scan dependenciessnyk monitor — continuous scan + notifications| Scenario | Config |
|---|---|
| GitHub Action | name: Security
on: [push, pull_request]
jobs:
snyk:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: snyk/actions/node@master
env:
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
with:
args: --severity-threshold=high |
| Docker image scan | $ snyk container test myapp:latest
$ snyk container monitor myapp:latest # continuous
# CI
$ snyk container test myapp:latest --severity-threshold=critical |
| Infrastructure as Code | $ snyk iac test terraform/
$ snyk iac test k8s/*.yaml
# Detects: open security groups, no encryption, etc. |
| Fix vulnerabilities | $ snyk wizard # interactive — suggests package upgrades
$ snyk protect # monkey-patches runtime
$ snyk fix # auto-create PR with upgrades |
| SARIF upload (GitHub) | - uses: snyk/actions/node@master
with: { args: --sarif-file-output=snyk.sarif }
- uses: github/codeql-action/upload-sarif@v3
with: { sarif_file: snyk.sarif } |
The tool checks HTTP security headers, SSL/TLS configuration, server info leaks, and protection against common attacks (XSS, clickjacking, MIME sniffing). A grade fromA to F shows overall security level.
Checking Content-Security-Policy, HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and more.
TLS version, certificate expiry, chain of trust, HSTS support.
Finding exposed server versions, debug modes, open configs, and directories.
Detailed report explaining each issue with specific steps to fix it.
HTTP header audit
config verification
CSP & HSTS setup
compliance checks
Strict-Transport-Security.Server: Apache/2.4.52 helps attackers find exploits. Hide the version.DENY or SAMEORIGIN.nosniff, browsers may misinterpret file types (MIME sniffing).Content-Security-Policy-Report-Only, monitor violations, then enforce.Server, X-Powered-By, X-AspNet-Version from responses.Security check history and HTTP security header monitoring.
Sign up freeSnyk: broader (containers + IaC + licensing), paid beyond free tier. Dependabot: GitHub-native, free, npm+pip+... — but only dependencies, no container scan. Use both.
Trivy: open source (Aqua Security), free, scans containers + IaC. Less polished UI but comparable coverage. For startups — Trivy. For enterprise — Snyk support.
Statically analyses source code for vulns (SQL injection, XSS). Competes with Semgrep, SonarQube. Free tier 100 tests/mo.
<code>snyk monitor</code> continuously tracks. New CVEs discovered → email/Slack alert. <a href="/en/monitors">Enterno uptime</a> for endpoint health complements it.