Flowlyt Security Analyzer
Version updated for https://github.com/harekrishnarai/flowlyt to version v1.1.0.
- This action is used across all versions by 0 repositories.
Action Type
This is a Composite action.
Go to the GitHub Marketplace to find the latest changes.
Action Summary
Flowlyt is an AI-powered security analyzer designed for GitHub Actions and GitLab CI/CD workflows. It automates the detection of security vulnerabilities by combining Abstract Syntax Tree (AST) analysis with AI-driven false positive reduction, context-aware analysis, and real-time verification. The tool significantly enhances CI/CD pipeline security by identifying misconfigurations, supply chain risks, and permission issues while reducing false positives and providing actionable insights with confidence scoring.
Release notes
What’s New
Three-layer AI architecture that reduces token cost by ≥60%, produces class-specific analysis, and delivers a modern streaming CLI experience.
Layer 1 — Heuristic Pre-filter
Zero-cost Go pattern matching skips obvious false positives before any API call: expression references (${{ secrets.X }}), placeholders, SHA-pinned actions, locked permissions. Always sends real token prefixes (ghp_, sk-, AKIA) and high-entropy blobs.
Layer 2 — Class-Specific Prompts
Four specialist system prompts replace the single generic template:
escalation— trigger × permissions × steps chain reasoninginjection— source → sink data flow tracingsecrets_context— live credential vs placeholder/referencesupply_chain_trust— trust context beyond SHA pinning
Layer 3 — Batch Dispatcher
- 5 findings per API call, grouped by class
- Index-echoed attribution (no positional misattribution)
- Falls back to individual calls on batch failure
- All 5 providers: Claude, OpenAI, Gemini, Grok, Perplexity
Streaming UX
Live progress bar, per-finding result lines as batches resolve, PrintAISummary box at scan end.
🤖 AI analysis [████████░░░░░░░░] 8/20 findings (escalation batch 2/3)
✗ PULL_REQUEST_TARGET_INJECTION CRITICAL TRUE POSITIVE 94%
Fix: isolate checkout in unprivileged job, remove write permissions
~ HARDCODED_SECRET HIGH FALSE POSITIVE 81%
Placeholder pattern — not a live credential
New output fields
AISkipped/AISkipReason/AIRemediationon findings (JSON, SARIF, CLI)ai.skipped,ai.skip_reason,ai.remediationSARIF properties
Breaking Changes
--ai-workersflag removed (synchronous batch design)NewAnalyzersignature:maxWorkers intparameter removed
Full Changelog
See CHANGELOG-v1.1.0.md for complete details.