Safeguard Documentation Center
Getting Started

Onboarding Workflow

Complete the Safeguard.sh setup and generate your first SBOM

Onboarding Workflow

Complete the onboarding wizard to connect your repositories, generate your first SBOM, and start securing your software supply chain.

Overview

The onboarding process guides you through:

  1. Connect Integrations - Link your source code and container platforms
  2. Add Projects - Import projects from connected integrations
  3. Review Results - Explore vulnerabilities, components, and security posture
  4. Enable AI Remediate - Let Griffin AI remediate issues automatically

Step 1: Connect Integrations

Source Code Repositories

Connect to your version control:

  1. Go to SettingsIntegrations
  2. Click Connect next to your provider:
    • GitHub
    • GitLab
    • Bitbucket
    • Azure Repos
    • AWS CodeCommit
  3. Authorize Safeguard.sh access
  4. Select repositories to monitor

Container Registries

Connect to scan container images:

  1. Go to SettingsIntegrations
  2. Click Connect next to your registry:
    • Docker Hub
    • AWS ECR
    • Google GCR
    • Azure ACR
  3. Enter credentials
  4. Test connection

Step 2: Generate Your First SBOM

Add a project from your connected integrations:

  1. Navigate to Projects
  2. Click + Add Project
  3. Select an integration source (GitHub, AWS, Bitbucket, etc.)
  4. Choose the repository or image to scan
  5. Configure project settings (branch, version)
  6. Click Add Project

The project will appear in the Projects table showing:

  • Project Name
  • Version
  • Status (active/inactive)
  • Organization
  • Findings summary (E, C, H, M, L counts)
  • Vulnerability count

Generation typically takes 1-5 minutes depending on project size.

Step 3: Review Results

Click on any project to view the Project Overview page with multiple tabs:

Info Tab

  • Project name and version
  • Created date and creator
  • Generation method (SCM, Container, Manual)
  • Source code repository URL
  • Branch/Tag information
  • Organization assignment
  • Findings by Severity chart
  • Vulnerabilities by Severity chart
  • Supply Chain Risk by Components
  • Findings by Gate

Additional Tabs

TabDescription
AttestationSupply chain attestation and provenance verification
DependenciesComplete dependency tree and component list
ProvenanceBuild and source provenance information
VulnerabilitiesSecurity vulnerabilities with severity ratings
MitigationsApplied mitigations and accepted risks
Security PostureOverall security scoring and posture assessment
Code QualityCode quality metrics and issues
Suppliers & LicensesLicense compliance and supplier information
FindingsAll findings across security gates and policies

Step 4: Enable AI Remediate

Let Griffin AI fix vulnerabilities automatically:

  1. Navigate to the Vulnerabilities tab in any project
  2. Click the AI Remediate button
  3. Review the proposed fix
  4. Click Create Pull Request

Or enable automatic remediation:

  1. Go to SettingsAI Remediate
  2. Enable Automatic PR Creation
  3. Configure settings
  4. Save

Next Steps

You're all set! Here's what to do next:

Need Help?

On this page