GitHub (App) Integration Setup
This guide walks you through connecting GitHub to RAD Security using the RAD Security App, enabling repository discovery, dependency graph analysis, code scanning, and organization visibility.Prerequisites
RAD Security currently only supports theuser-to-server mechanism for authentication for the GitHub App integration. This means that in addition to the app being installed in the organisation, it also needs to be authorized to act on a user’s behalf. It is strongly recommended that a Service Account in your GitHub organization is created for this purpose.
Before you begin, ensure you have:
Admin access to your GitHub organization (to create Service Account and install the app)
Access to RAD Security workspace with integration permissions
Understanding of which repositories need to be scanned (public, private, or both)
Create Service Account
The RAD Security GitHub App usesuser-to-server authentication to operate with permissions that are the intersection of three factors:
- App’s granted permissions - What the GitHub App has been configured to access
- Installation permissions - Which repositories the app was installed with access to
- Service account permissions - What the authorizing user account can access
1
Create a GitHub account for RAD Security
Create a new GitHub user account (or use an existing service account) that will be dedicated to RAD Security integration. We recommend naming it something like
rad-security-bot.2
Add account to your organization
Invite the service account to your GitHub organization with the Member role (not Owner). This limits the account’s base permissions.
3
Grant repository access
Add the service account to teams or grant direct repository access for the repositories you want RAD Security to scan. The service account needs read access to:
- Repository contents
- Repository metadata
- Dependency graphs (automatically granted with repo read access)
4
Grant organization read permissions
To enable organization visibility features, ensure the service account can read organization membership. This is typically granted by default to organization members, but verify in your organization settings under Member privileges.
Important: The service account does not need any write permissions. RAD Security operates in read-only mode for security analysis.
Install GitHub App
Before authorizing the app in RAD Security, you must install the RAD Security GitHub App in your organization.1
Navigate to the RAD Security App
Visit the RAD Security GitHub App page
2
Click Install
Click the green Install button.
3
Select organization
Choose the GitHub organization where you want to install the app. You must have admin access to the organization to complete this step.
4
Choose repository access
Select which repositories the app can access:
- All repositories - Recommended for comprehensive security coverage
- Only select repositories - Choose specific repositories if you want to limit scope
5
Complete installation
Review the permissions requested by the app and click Install. The app requests:
- Contents (read-only) - Read repository and package contents
- Metadata (read-only) - Read repository metadata
- Organization members (read-only) - Read organization membership information
The installation grants the app access to repositories, but does not yet allow RAD Security to use it. You must complete the authorization flow in the next step.
Configure in RAD Security
After installing the app in your GitHub organization, configure the integration in RAD Security:1
Navigate to Integrations
Go to your RAD Security workspace and navigate to Data Sources → Integrations.
2
Select GitHub (App)
Find and click on GitHub (App) from the list of available integrations.
3
Enter Integration Details
You’ll be taken to a screen where you need to enter:
- Integration Name: A descriptive name for this integration (e.g.,
GitHub - Acme Org)
4
Authorize with Service Account
You’ll be redirected to GitHub’s authorization page. You can either:
- Select the service account from the account picker if already signed in
- Sign in as the service account if not already signed in
5
Return to RAD Security
After authorization, you’ll be automatically redirected back to the integration summary page for your GitHub App integration.
Token Management: The tokens RAD Security uses expire and are automatically refreshed. You’ll only need to re-authorize after 6 months of inactivity or if you revoke the authorization in GitHub.
Verify Integration
After completing the authorization flow, verify your integration is working:1
Navigate to Integrations
Go to Data Sources → Integrations and locate your GitHub App integration.
2
Check Integration Status
Verify that:
- The status shows Connected
- The Login field displays your service account username (e.g.,
rad-security-bot)
Your GitHub App integration is now configured! RAD Security will now be able to scan your GitHub repositories and packages.
What Data is Used
Repository Information
Repository Information
- Repository names and metadata
- Visibility settings (public/private)
- Default branch information
- Repository topics and descriptions
Dependency Data
Dependency Data
- Software Bill of Materials (SBOM) via Dependency Graph API
- Direct and transitive dependencies
- Dependency versions and sources
- Manifest file contents (package.json, requirements.txt, etc.)
Organization Data
Organization Data
- Organization membership
- Team structures (if accessible)
- Member roles and permissions
Package Registry
Package Registry
- Published packages
- Package versions
- Package metadata
Use Cases
Dependency Vulnerability Detection
Identify vulnerable dependencies across all repositories using SBOM data and known vulnerability databases.
Software Supply Chain Visibility
Map your complete software supply chain by tracking all direct and transitive dependencies.
Code Security Analysis
Search code across repositories for security anti-patterns, secrets, or vulnerable code constructs.
Organization Security Posture
Monitor organization membership and repository access to identify potential security risks.
Troubleshooting
Private Repositories Not Appearing
Private Repositories Not Appearing
- Confirm the app is installed in the organization with access to the desired repositories
- Confirm the service account has the correct permissions to access the desired repositories
- Check if the repositories are in an organization that requires SSO authentication
Organization Data Missing
Organization Data Missing
- Verify the Service Account has the permission to read organization data