Install and Configure Seeker Jenkins Plugin

The Seeker Jenkins plugin facilitates the integration of security testing in CI/CD processes by enabling an additional build step. This build step will cause a build failure upon detection of any critical or high vulnerability and generate a Seeker security report.

To install the plugin, perform the following steps:

  1. Download the Jenkins plugin file by navigating to <Seeker host>:<port>/rest/ui/installers/integrations/jenkins.
  2. Log on to your Jenkins instance as an administrator.
  3. Go to Manage Jenkins > Manage Plugins > Advanced.
  4. Upload the downloaded plugin file SeekerJenkinsPlugin.hpi to Jenkins.
To configure the plugin, you need an access token for Seeker APIs. For instructions, see Configure Access Tokens.
  1. Go to Manage Jenkins > Configure System, and scroll to Seeker Configuration.
  2. Enter Seeker Base URL and Access Token that you have generated.
  3. In the Jenkins dashboard, click your <Jenkins job> > Configure.
  4. Click Add build step > Seeker Build Status.
  5. Enter the following properties:
    PropertyDescription
    Project Keys A comma-separated list of project keys, for example:default,projectA,projectB.
    Fail on Detection Select a detection type on which the build should fail. For example, A verified vulnerability (Critical/High) is detected.
    Report Format Select a format for generating a vulnerability report.
  6. Add and configure any number of additional build steps, as required for different projects and/or vulnerability detections.
  7. Click Save.