Security Analysis Workflows
Fraim provides specialized AI-powered workflows for different types of security analysis. Each workflow is optimized for specific use cases and file types, allowing you to choose the right tool for your security needs.Available Workflows
⚠️ Risk Flagger
Workflow ID:risk_flagger
Identifies code changes that require security team review and investigation. Integrates with Github and allows you to loop in a reviewer and block a PR until that reviewer approves.
🔍 Code Security Analysis
Workflow ID:code
Static analysis of application source code for security vulnerabilities.
🏗️ Infrastructure as Code Analysis
Workflow ID:iac
Security analysis of infrastructure configuration files and deployment manifests.
📋 System Analysis
Workflow ID:system_analysis
Extracts system purpose, users, and business context from codebases and documentation.
Performance Considerations
Resource Usage by Workflow
- System Analysis: Low resource usage, focuses on documentation
- Risk Flagger: Low resource usage, analyzes only changed files
- Code Analysis: Moderate to high resource usage, includes triaging phase
- IaC Analysis: Moderate resource usage, single-pass analysis
Optimization Tips
- Use
--limit
to test workflows on smaller file sets first - Adjust
--chunk-size
based on system capabilities - Control concurrency with
--max-concurrent-chunks
- Use higher
--confidence
thresholds to reduce processing time
Getting Started
1. Choose Your Workflow
Select the workflow that matches your security analysis needs.2. Start Simple
3. Integrate with GitHub Actions (Recommended)
Use the official Fraim GitHub Action for seamless CI/CD integration:4. Customize as Needed
Add specific options based on your requirements:5. Scale Your Integration
- Set up automated security gates
- Create workflow-specific pipelines
- Implement custom risk policies