

# Using Amazon Inspector with GitHub actions
<a name="cicd-inspector-github-actions"></a>

 You can use Amazon Inspector with [https://github.com/features/actions](https://github.com/features/actions) to add Amazon Inspector vulnerability scans to your GitHub workflows. This leverages the [Amazon Inspector SBOM Generator](https://docs.aws.amazon.com/inspector/latest/user/sbom-generator.html) and [Amazon Inspector Scan API](https://docs.aws.amazon.com/inspector/v2/APIReference/API_Operations_Inspector_Scan.html) to produce detailed reports at the end of your build, so you can investigate and remediate risk before deployment. Amazon Inspector vulnerability scans can be configured to pass or fail workflows based on the number and severity of vulnerabilities detected. You can view the latest version of the Amazon Inspector action on the [GitHub website](https://github.com/aws-actions/vulnerability-scan-github-action-for-amazon-inspector). For information about how to integrate Amazon Inspector Scan into your CI/CD pipeline, see [Integrating Amazon Inspector scans into your CI/CD pipeline](https://docs.aws.amazon.com/inspector/latest/user/scanning-cicd.html). For a list of operating systems and programming languages that Amazon Inspector supports, see [Supported operating systems and programming languages](https://docs.aws.amazon.com/inspector/latest/user/supported.html). 