PR Scanning Configuration

Customize DryRun Security behavior per repository - enable agents, attach policies, configure blocking, and set up notifications.

Configurations let you customize how DryRun Security behaves for each repository or group of repositories. You can control which agents run, which policies are enforced, whether findings block PRs, and how notifications are delivered.

Creating a Configuration

  1. Log in to the DryRun Security portal at https://app.dryrun.security.
  2. Navigate to Settings > Configurations in the sidebar.
    Note: The default configuration is editable and applies to all repositories not included in another configuration.
  3. Click Add new Configuration +.
  4. Enter a Configuration Name at the top of the page.

Configuration Walkthrough

The Configurations page shows all your existing repository configurations.

Repository configurations list in DryRun Security dashboard

Click Add New Configuration to create a configuration for your repositories.

Add New Configuration dialog

Select Repositories

Choose which repositories this configuration applies to.

Selecting repositories for a configuration

PR Comments and Notifications

Enable or disable PR issue comments for this configuration.

Issue comment toggle

Enable notifications to get alerts when security findings are detected.

Notifications toggle

Draft PRs: Comments are not sent to draft PRs. Findings from draft PR scans still appear in the Risk Register dashboard, but no comment is posted to the SCM until the PR is marked ready for review.

Attach Code Policies

Add up to 7 Custom Code Policies to a configuration.

Adding code policies to a configuration
Configuring attached policies

Code Security Agents

Configure which security agents are enabled and whether they block or run silently.

Configuring code security agents

Save the configuration when complete.

Saving a repository configuration

Code Security Agents

The bottom section of the configuration page lists all available Security Analyzers. Each analyzer has its own row with three controls:

AnalyzerDescription
Cross-Site Scripting AnalyzerDetects XSS vulnerabilities across rendering contexts
General Security AnalyzerBroad-spectrum analyzer covering auth gaps, crypto, debug artifacts, and more
IDOR AnalyzerSurfaces broken object-level authorization
Mass AssignmentDetects unsafe model binding patterns
Secrets AnalyzerCatches committed credentials, API keys, and tokens
Server-Side Request Forgery AnalyzerIdentifies SSRF via user-controlled outbound requests
SQL Injection AnalyzerTraces data flow to detect unsafe query composition

Setting Descriptions

The top section of a configuration provides these controls:

  • Select Repositories - A dropdown selector to choose which repositories use this configuration. Repositories can only belong to one configuration at a time; repositories already assigned to another configuration will be greyed out.
  • Issue Comment Enabled - Toggle to enable or disable DryRun Security's PR/MR comment. When enabled, DryRun posts a summary comment on each pull request with findings. Comments are not sent to draft PRs; findings from draft PR scans are still visible in the Risk Register.
  • PR Blocking Enabled - Toggle to enable PR blocking globally for this configuration. When enabled, findings from configured agents and policies will create GitHub status checks that must pass before merging.
  • Notifications Enabled - Toggle to enable notification delivery. When enabled, choose which integrations receive alerts (see Notifications for setup details).
  • Severity-Based PR Blocking - Toggle to block PRs based on severity. When enabled, set a minimum severity threshold; any finding at or above that level will block the PR from being merged. See PR Blocking for threshold options.
  • Show Comment for No Findings - Toggle to control whether DryRun posts a comment even when no security findings are detected. Toggle off for the familiar behavior where DryRun posts a comment only when scans produce findings. Toggle on to have DryRun post a comment on every PR scanned, useful for visibility and audit trails.
  • Deduplicate Notifications - Toggle to reduce duplicate notifications on PRs where the severity has not changed. When enabled, repeated notifications for the same severity are suppressed, reducing noise.

Policy Enforcement Agent

Below the general settings, the Policy Enforcement Agent section lets you attach Custom Code Policies to this configuration:

  • Add Policy - Attach an existing policy from your organization's Policy Library
  • Create Policy - Write a new Custom Code Policy directly from this screen

Each attached policy is shown as a row with its own controls:

  • Blocking - Toggle to make this policy a required status check. When enabled, a policy violation prevents the PR from being merged.
  • Silent Mode - Toggle to run the policy without posting findings in the PR comment. Useful for testing new policies before enforcing them.
  • Risk Level - Dropdown to set the severity label returned when the policy has findings. Options are Critical, High, Medium, or Low.

The Policy Enforcement Agent can run up to 7 code policies per repository.