Secbez Docs

Policy & Merge Checks

How Secbez uses policies to control whether pull requests can be merged based on severity thresholds.

Secbez evaluates findings against your security policy to decide whether a pull request should pass, warn, or fail.

How policy evaluation works

After scanning a pull request, Secbez checks the findings against your configured thresholds:

  1. If any finding exceeds a fail threshold -- Check Run status is set to Failure
  2. If any finding exceeds a warn threshold -- Check Run status is set to Warning (neutral)
  3. If no thresholds are exceeded -- Check Run status is set to Success

Default policy thresholds

ConditionAction
Any critical severity findingFail
Any high severity + high confidence findingFail
Any high severity finding (any confidence)Warn
Any medium severity findingWarn
All other findingsPass

Enforcing checks

To prevent merging PRs that fail the security check:

  1. Go to your GitHub repository settings
  2. Navigate to Branches > Branch protection rules
  3. Enable Require status checks to pass before merging
  4. Select the Secbez Security Scan check

Once enabled, PRs with critical or high-confidence high-severity findings cannot be merged until the issues are resolved.

Customizing policy

Policy thresholds can be adjusted to match your team's risk tolerance. Stricter policies catch more issues before merge; more relaxed policies reduce friction during development.

On this page