Skip to content

Snyk

Ingest SCA and container scanning findings from Snyk.

1 min read · For: Security Engineers Admins · Updated Mar 22, 2026 · Edit

Imports software composition analysis and container vulnerability findings from Snyk into Basirah.

Prerequisites

  • Snyk account with API access
  • Snyk API token with read permissions
  • Organization ID from your Snyk organization settings

Authentication

API key — provide your Snyk API token.

Configuration

api_token string required

Snyk API token for authentication.

org_id string required

Snyk organization ID to sync findings from.

Data flow

Ingests vulnerability findings from Snyk and normalizes them into Basirah’s common finding format.