Use this if
Run your first scan, submit findings, and confirm data quality before expanding to more integrations.
- Audience
- Security engineers, CI owners, and integration engineers
- Typical time
- 10-15 minutes
Public Guide
Run your first scan, submit findings, and confirm data quality before expanding to more integrations. Audience: Security engineers, CI owners, and integration engineers. Typical setup time: 10-15 minutes.
Run your first scan, submit findings, and confirm data quality before expanding to more integrations.
Start here
Step 1
Use a deterministic target and a known scanner image so results are easy to validate.
What success looks like
Keep branch, commit, or artifact metadata for troubleshooting.
Step 2
Create a workspace key in API Keys and use it only for scanner ingestion.
What success looks like
Capture response logs as proof of accepted payloads.
Step 3
Ensure findings are complete, severity is mapped correctly, and repeated uploads do not duplicate issues.
What success looks like
Resubmit the same payload once and verify deduplication behavior.
TOKEN=$(curl -s -X POST "http://localhost:8000/api/v1/auth/login?email=admin@acme.com&password=changeme123" | python3 -c "import sys, json; print(json.load(sys.stdin)['access_token'])")
curl -s -X POST http://localhost:8000/api/v1/api-keys \
-H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{"label":"Pipeline Scanner","expires_in_days":90}'docker run --rm \
-v /var/run/docker.sock:/var/run/docker.sock \
-e BLACKSHIELD_API_URL=http://localhost:8000 \
-e BLACKSHIELD_API_KEY=sp_your_key_here \
-e SCAN_TOOL=trivy \
-e SCAN_TARGET=python:3.11-slim \
public.ecr.aws/blackshield-security/pipeline-scanner:1.0.0Keep your rollout moving with the next recommended step.
Review and Prioritize Findings