diff --git a/docs/docs.json b/docs/docs.json
index f30d60aa26f..f4638dd4796 100644
--- a/docs/docs.json
+++ b/docs/docs.json
@@ -48,6 +48,7 @@
"mission-control/integrations",
"mission-control/integrations/github",
"mission-control/integrations/sentry",
+ "mission-control/integrations/snyk",
"mission-control/integrations/slack-agent"
]
},
diff --git a/docs/guides/snyk-mcp-continue-cookbook.mdx b/docs/guides/snyk-mcp-continue-cookbook.mdx
index 06c50645ad4..90463f74f1d 100644
--- a/docs/guides/snyk-mcp-continue-cookbook.mdx
+++ b/docs/guides/snyk-mcp-continue-cookbook.mdx
@@ -4,6 +4,24 @@ description: "Set up an AI-powered security workflow that automatically scans yo
sidebarTitle: "Snyk Security Scanning with Continue"
---
+
+
+ **🚀 New: Snyk Mission Control Integration with Continuous AI**
+
+ The new [Snyk Mission Control Integration](/mission-control/integrations/snyk) enables **[Continuous AI](/guides/continuous-ai)** - where AI agents autonomously detect, analyze, and fix vulnerabilities. When Snyk detects an issue, your agent automatically generates a fix, creates a PR, and validates the solution without manual intervention.
+
+ **Mission Control Benefits:**
+ - **One-click OAuth** - No tokens, no configuration files, just connect and go
+ - **Centralized workflows** - Manage all security Tasks and automations from one dashboard
+ - **Webhook triggers** - Automatically respond to new vulnerabilities as they're discovered
+ - **Metrics & intervention rates** - Track how often agents successfully fix issues without human help
+
+ This represents **[Level 2 Continuous AI](/guides/continuous-ai#the-continuous-ai-maturity-model)**: AI handles routine security work autonomously while developers focus on complex problems. As outlined in our [Continuous AI guide](/guides/continuous-ai#best-practices-for-sustainable-continuous-ai), this reduces intervention rates and accelerates secure development.
+
+ **Get Started:** Use this cookbook to understand the fundamentals, then [enable Mission Control](/mission-control/integrations/snyk) to deploy autonomous security agents across your organization.
+
+
+
An automated security scanning system that uses Continue's AI agent with Snyk
MCP to identify vulnerabilities in code, dependencies, infrastructure, and
diff --git a/docs/index.mdx b/docs/index.mdx
index 6c4a2f2dc68..e2b5d9a2266 100644
--- a/docs/index.mdx
+++ b/docs/index.mdx
@@ -33,7 +33,7 @@ description: "Create, run, and automate AI agents across Mission Control, termin
Connect Continue to your existing developer tools to power Tasks and Workflows.
-
+
Enable repository access for Agents to read and create PRs.
@@ -43,6 +43,9 @@ description: "Create, run, and automate AI agents across Mission Control, termin
Automatically generate PRs to fix new issues from Sentry alerts.
+
+ Detect and fix security vulnerabilities automatically.
+
@@ -139,6 +142,6 @@ description: "Create, run, and automate AI agents across Mission Control, termin
icon="plug"
href="/mission-control/integrations"
>
- Connect GitHub, Slack, and Sentry to power your automations.
+ Connect GitHub, Slack, Sentry, and Snyk to power your automations.
diff --git a/docs/mission-control/integrations/index.mdx b/docs/mission-control/integrations/index.mdx
index 9485edb1a50..9bb796866fe 100644
--- a/docs/mission-control/integrations/index.mdx
+++ b/docs/mission-control/integrations/index.mdx
@@ -1,6 +1,6 @@
---
title: "Overview"
-description: "Connect GitHub, Slack, and Sentry to power richer Agents, Tasks, and Workflows."
+description: "Connect GitHub, Slack, Sentry, and Snyk to power richer Agents, Tasks, and Workflows."
sidebarTitle: "Overview"
---
@@ -8,9 +8,9 @@ sidebarTitle: "Overview"
Integrations let Continue connect to the tools you already use, so Agents can read code, open pull requests, send messages, react to real-world events, and more.
-Mission Control currently supports three first-class integrations:
+Mission Control currently supports four first-class integrations:
-
+
Required for PR creation, repo access, diffs, and workflow triggers.
@@ -24,6 +24,10 @@ Mission Control currently supports three first-class integrations:
Trigger Agents automatically when new Sentry issues appear.
+
+ Detect and fix security vulnerabilities automatically.
+
+
diff --git a/docs/mission-control/integrations/snyk.mdx b/docs/mission-control/integrations/snyk.mdx
new file mode 100644
index 00000000000..a5a980c4fba
--- /dev/null
+++ b/docs/mission-control/integrations/snyk.mdx
@@ -0,0 +1,316 @@
+---
+title: "Snyk Integration"
+description: "Automatically detect and fix vulnerabilities with Continue Agents connected to Snyk"
+---
+
+## Overview
+
+Connect Snyk to Continue Mission Control to enable agents to automatically detect, analyze, and resolve security vulnerabilities. When Snyk is enabled, Continue can generate PRs to fix vulnerabilities, analyze security patterns, and maintain application security posture.
+
+
+
+ - Automatically generate PRs to fix security vulnerabilities
+ - Analyze dependency risks and suggest updates
+ - Monitor security posture across projects
+ - Create detailed vulnerability reports with remediation steps
+ - Track vulnerability trends and compliance status
+
+
+
+## Setup
+
+
+
+
+
+ Go to your [Integrations Settings](https://hub.continue.dev/integrations).
+
+
+
+
+
+ Click "Connect" next to Snyk integration.
+
+
+
+
+
+ Click the "Connect with Snyk" button to authorize Continue Mission Control:
+
+ - You'll be redirected to Snyk's OAuth authorization page
+ - Review and approve the requested permissions
+ - You'll be automatically redirected back to the [Snyk inbox view](https://hub.continue.dev/inbox?view=snyk)
+
+
+
+
+
+ Once redirected back, you'll see:
+ - A confirmation that Snyk is connected
+ - Your Snyk projects available for monitoring
+ - Any active vulnerability alerts
+
+
+
+
+
+
+
+ **OAuth Authorization**: No manual token configuration needed! Simply click the authorization button and Continue will securely handle the authentication flow with Snyk.
+
+
+
+## Use Cases
+
+### Code Vulnerability Scanning (SAST)
+
+Scan your source code for security vulnerabilities:
+
+
+
+ **Task Example**: "Run a Snyk Code scan on this repo with severity threshold medium. Summarize issues with file:line locations and propose minimal fixes for the top 3 critical issues."
+
+ **What the Agent Does**:
+ - Performs static application security testing on your code
+ - Identifies security vulnerabilities with exact file and line numbers
+ - Prioritizes issues by severity and exploitability
+ - Generates minimal, targeted fixes for critical issues
+ - Re-runs scans to verify fixes resolve the vulnerabilities
+
+ **Run in Mission Control**: Set up as pre-commit hook or PR check
+
+
+
+### Dependency Scanning (SCA)
+
+Check open source dependencies for known vulnerabilities:
+
+
+
+ **Task Example**: "Run Snyk Open Source scan including dev dependencies. Summarize vulnerable dependency paths and propose a minimal-risk upgrade plan."
+
+ **What the Agent Does**:
+ - Performs software composition analysis on all dependencies
+ - Maps vulnerability paths through dependency tree
+ - Identifies minimal-risk upgrade strategies
+ - Creates dependency update plans with compatibility checks
+ - Re-tests after proposed changes to confirm resolution
+
+ **Run in Mission Control**: Schedule weekly or trigger on package updates
+
+
+
+### Infrastructure as Code (IaC) Security
+
+Scan Terraform, CloudFormation, and Kubernetes configs:
+
+
+
+ **Task Example**: "Scan ./infra directory with Snyk IaC. Report high/critical misconfigurations with exact files and lines. Provide corrected configurations."
+
+ **What the Agent Does**:
+ - Scans infrastructure code for security misconfigurations
+ - Identifies exposed secrets and overly permissive policies
+ - Reports exact file locations and line numbers
+ - Provides secure configuration alternatives
+ - Re-scans to confirm misconfigurations are resolved
+
+ **Run in Mission Control**: Run before infrastructure deployments
+
+
+
+### Container Security Scanning
+
+Analyze Docker images for vulnerabilities:
+
+
+
+ **Task Example**: "Scan Docker image my-api:latest excluding base image vulnerabilities. Show dependency tree and recommend safer base images."
+
+ **What the Agent Does**:
+ - Scans container images for OS and application vulnerabilities
+ - Analyzes complete dependency tree in containers
+ - Recommends security-hardened base images
+ - Creates optimized Dockerfiles with security improvements
+ - Re-tests after changes to verify vulnerability reduction
+
+ **Run in Mission Control**: Trigger on container builds or before deployments
+
+
+
+### Pull Request Security Scanning
+
+Focus scanning on modified files:
+
+
+
+ **Task Example**: "Scan only files changed since origin/main with Snyk Code. Block if new high severity issues would be introduced."
+
+ **What the Agent Does**:
+ - Targets security scanning to changed files only
+ - Compares security posture before and after changes
+ - Identifies newly introduced vulnerabilities
+ - Shows security impact delta for the PR
+ - Blocks merge if critical issues are detected
+
+ **Run in Mission Control**: Set up as PR check automation
+
+
+
+### Security Learning Integration
+
+Access contextual security education:
+
+
+
+ **Task Example**: "Open Snyk Learn lessons related to the top CWE vulnerabilities from this scan."
+
+ **What the Agent Does**:
+ - Maps vulnerabilities to Common Weakness Enumeration (CWE) categories
+ - Retrieves relevant Snyk Learn educational content
+ - Provides contextual security training based on actual issues
+ - Links to remediation guides and best practices
+ - Tracks security knowledge gaps across the team
+
+ **Run in Mission Control**: Run after security scans for team education
+
+
+
+## Running Snyk Agents in Mission Control
+
+You can run Snyk-connected agents in two ways:
+
+### 1. Manual Tasks
+
+Trigger agents on-demand for vulnerability analysis:
+
+1. Go to [Mission Control Agents](https://hub.continue.dev/agents)
+2. Select or create a Snyk-enabled agent
+3. Click "Run Agent" and provide your task description
+4. Monitor progress and review results in real-time
+
+**Example Tasks:**
+- "Scan all projects for critical vulnerabilities and prioritize fixes"
+- "Update all npm dependencies with known vulnerabilities"
+- "Generate a security report for the last sprint"
+
+### 2. Automated Workflows
+
+Set up agents to run automatically:
+
+- **Webhook-triggered**: Execute when new vulnerabilities are detected
+- **Scheduled**: Run daily or weekly security scans
+- **PR-triggered**: Scan new dependencies before merge
+
+
+
+ Start with manual tasks to understand your vulnerability patterns, then automate the most common remediation workflows for continuous security.
+
+
+
+## Integration with GitHub
+
+Combine Snyk with GitHub integration for a complete security workflow:
+
+
+
+
+
+ Enable both Snyk and GitHub integrations in Mission Control
+
+
+
+
+
+ Build an agent that:
+ - Receives Snyk vulnerability alerts
+ - Analyzes the security issue in your codebase
+ - Creates a PR with the security fix
+ - Adds security impact analysis to the PR
+
+
+
+
+
+ Configure the agent to run automatically on new critical vulnerabilities
+
+
+
+
+
+## Monitoring Agent Activity
+
+Track your agent's security remediation performance:
+
+1. **View in Inbox**: Navigate to the [Snyk view](https://hub.continue.dev/inbox?view=snyk) to see all Snyk-related agent activity
+2. **Check Snyk Dashboard**: Verify that vulnerabilities are being addressed
+3. **Review PRs**: Ensure quality and security of generated fixes
+4. **Monitor Metrics**: Track mean time to remediation (MTTR) and fix rate
+
+## Troubleshooting
+
+
+
+ **Problem**: Can't complete the Snyk authorization flow
+
+ **Solutions**:
+ - Ensure you have appropriate permissions in your Snyk organization
+ - Check if your organization allows OAuth integrations
+ - Try logging out and back into Snyk before authorizing
+ - Clear browser cookies and try again
+
+
+
+
+
+ **Problem**: Snyk projects aren't visible after connection
+
+ **Solutions**:
+ - Verify you have access to projects in Snyk
+ - Check that projects are properly imported in Snyk
+ - Refresh the integration connection
+ - Ensure the OAuth scope includes project access
+
+
+
+
+
+ **Problem**: Agent returns errors when trying to fetch Snyk data
+
+ **Solutions**:
+ - Verify the OAuth connection is still valid
+ - Re-authorize if the token has expired
+ - Check that the agent has the necessary Snyk context provider
+ - Review agent logs for specific error messages
+
+
+
+
+
+ **Problem**: Agent isn't running when new vulnerabilities are found
+
+ **Solutions**:
+ - Verify webhook configuration in Snyk settings
+ - Check that webhook URL points to Continue Mission Control
+ - Ensure webhook events include vulnerability detection
+ - Review webhook delivery logs in Snyk
+
+
+
+## Support & Resources
+
+
+
+
+
+ Complete guide with security scanning recipes, CI/CD integration, and automated remediation workflows
+
+
+
+
+
+ Combine Snyk with GitHub for complete security automation
+
+
+
+
\ No newline at end of file