Configuration
Configure Secbez — repository scope, policy, suppressions, baselines, and notifications.
Most configuration lives on the Secbez dashboard, scoped per-repository. This page is a reference for what's configurable and where it lives.
Repository scope
Manage which repositories Secbez can see from GitHub:
- GitHub → Settings → Applications → Installed GitHub Apps → Secbez → Configure.
- Switch between All repositories and a specific selection.
Removing a repository from the selection stops new scans but does not delete existing findings.
Per-repository settings
On the dashboard, Repository → Settings exposes:
Scan behavior
- Default branch — the reference branch for baseline diffs and full scans.
- Additional protected branches — extra branches whose PRs should also be scanned (defaults to the default branch only).
- Scan triggers — PR open/sync, push to protected branch, scheduled, manual.
- Path includes / excludes — restrict the scan to specific directories or skip generated paths (e.g.,
dist/,vendor/, third-party SDKs).
Policy
- Severity / confidence thresholds for warn and fail outcomes.
- Per-rule overrides — promote or demote specific rule IDs.
- Per-path overrides — different thresholds for production code vs. tests / scripts.
needs-reviewhandling — gate, warn, or pass.
See Policy & Merge Checks for the threshold model.
Suppressions
- Active suppressions — view and edit the server-side suppression list.
- Inline marker enforcement — require a reason on every inline marker.
Baseline
- Active baseline scan — the scan run that defines the current baseline.
- Re-baseline — set the next full scan as the new baseline.
Notifications
- Slack / Microsoft Teams / email integrations for new high-severity findings, gate failures, and scheduled scan summaries.
- Webhooks for downstream automation.
Organization-level settings
The organization dashboard exposes:
- Member roles (owner, admin, member, read-only).
- API tokens for programmatic access.
- Audit log export.
Self-hosted / Enterprise
Self-hosted deployments are configured through environment variables and a license bundle. The full configuration surface — model routing, GPU selection, graph engine sizing, queue backend, storage, license — is documented under Enterprise → Configuration.
Customer-facing dashboard settings remain the same regardless of deployment model.