Skip to content

GitHub Action

Generate SARIF from Fortify on Demand

1.1.0 Latest version
Use latest version

Generate SARIF from Fortify on Demand

Generate SARIF file from Fortify on Demand SAST results for import to GitHub


Copy and paste the following snippet into your .yml file.

- name: Generate SARIF from Fortify on Demand
  uses: fortify/[email protected]
Learn more about this action in fortify/gha-fod-generate-sarif
Choose a version

Generate SARIF from Fortify on Demand

Build secure software fast with Fortify. Fortify offers end-to-end application security solutions with the flexibility of testing on-premises and on-demand to scale and cover the entire software development lifecycle. With Fortify, find security issues early and fix at the speed of DevOps.

This GitHub Action invokes the Fortify on Demand (FoD) API to generate a SARIF log file of Static Application Security Testing (SAST) results. The SARIF output is optimized for subsequent import into GitHub to display vulnerabilities in the Security Code Scanning Alerts.

Deprecation Notice

This GitHub Action is being replaced by to allow customers to benefit from the following enhancements:

  • Support for both FoD and SSC
  • Support for additional output formats
  • Support for exporting by release name instead of release id
  • Support for advanced configuration options
  • Better stability and error handling

The fortify/gha-export-vulnerabilities action is mostly a drop-in replacement for fortify/gha-fod-generate-sarif, but will require some changes in your workflows:

  • Obviously the uses: clause needs to be updated to use the new fortify/gha-export-vulnerabilities action
  • Input parameter naming convention has slightly changed:
    • FoD-related input parameters use the fod_ prefix, for example fod_user instead of plain user
    • Dashes have been replaced by underscores, i.e. fod_release_id instead of release-id
  • Input parameters for specifying the output file location have changed:
    • The standard input parameter output has been removed
    • Default GitHub SARIF output is written to ${GITHUB_WORKSPACE}/gh-fortify-sast.sarif
    • Output directory can be changed using the export_dir input parameter
    • Output file name can only be changed through custom configuration, not through standard action input parameters


The primary use case for this action is after completion of a FoD SAST scan. See the Fortify on Demand Scan action for more details on how to initiate a FoD SAST scan, including polling for completion, in your workflow. The following sample workflow demonstrates steps to import results from FoD into GitHub Security Code Scanning:

name: Import FoD SAST Results
on: [workflow dispatch]
    runs-on: ubuntu-latest

      # Pull SAST issues from Fortify on Demand and generate SARIF output
      - name: Download Results
        uses: fortify/[email protected]
          tenant: ${{ secrets.FOD_TENANT }}
          user: ${{ secrets.FOD_USER }}
          password: ${{ secrets.FOD_PAT }}
          release-id: ${{ secrets.FOD_RELEASE_ID }}
          output: ./sarif/output.sarif
      # Import Fortify on Demand results to GitHub Security Code Scanning
      - name: Import Results
        uses: github/codeql-action/[email protected]
          sarif_file: ./sarif/output.sarif

For sample workflows implementing this and other Fortify actions, see:


  • Issues that are marked as Fix Validated or are suppressed in FoD are ignored.
  • SARIF is designed specifically for SAST findings, so this action ignores FoD Dynamic (DAST), Mobile (MAST) and Open Source/Software Composition (OSS/SCA) issues.
  • GitHub Code Scanning currently supports SARIF files with up to 1,000 issues. If the FoD release contains more than 1,000 issues, this action will iteratively remove lower priority issues - low, then medium, then high - in an attempt generate an importable SARIF file. If there are more than 1,000 critical issues, the action will abort.
  • All issues are created with the SARIF level of warning. Fortify Priority Order (severity) is assigned via tags for filtering.
  • If you are not already a Fortify customer, check out our Free Trial



Required The base URL for the Fortify on Demand environment where your data resides.

tenant + user + password OR client-id + client-secret

Required Credentials for authenticating to Fortify on Demand. Strongly recommend use of GitHub Secrets for credential management. Personal Access Tokens require the view-apps and view-issues API scopes. Client credentials require the Read Only (or higher) role.


Required The target FoD release ID to pull SAST issues from.


Required The location of generated SARIF output.


SARIF log file that is optimized for subsequent import and viewing in GitHub Security Code Scanning