Skip to content
GitLab logoGitLab logo
Intruder logoIntruder logo
GitLab logoGitLab logo
Intruder logoIntruder logo

GitLab + Intruder

GitLab + Intruder

GitLab + Intruder integrations

Create GitLab issues for new Intruder issues

If you have a security issue in your infrastructure, you'll want to ensure your development team knows about it asap! Use the Intruder Zapier integration to automatically create a GitLab issue whenever Intruder finds new security issues and keep everyone in the loop.

  1. When this happens...
    New Issue
    New Issue
    New IssueTriggers when a new issue is found.
  2. automatically do this!
    Create Issue
    Create Issue
    Create IssueCreates a new issue.
Start free with email
Start free with email
Google Logo Start free with Google
  • Free forever for core features
  • 14 day trial for premium features & apps

More things you can do with Intruder and GitLab

Discover other triggers and actions you can use with Intruder and GitLab

    • Severity
      Required
    Trigger
    Polling
    Try It
    • Target addresses
    • Tag names
    Action
    Write
    • Issue IDs
    • Target addresses
    • Tag names
    • Severity
    • Snoozed?
    Action
    Search
    • Address
    Action
    Search
  • Intruder triggers, actions, and search
    Scan Complete

    Triggers when a scan completes.

    Trigger
    Polling
    Try It
    • Address
      Required
    Action
    Write
    • Issue ID
      Required
    • Snoozed?
    Action
    Search
    • Address
      Required
    Action
    Search or write
gitlab logo
About GitLab
GitLab is an open source code collaboration tool with a rich feature set including management of repositories, reviewing tools, issue tracking, activity feeds and much more.
Related categories
Similar apps
GitHub integrationsGitHub integrations
GitHub
Developer Tools
Azure DevOps integrationsAzure DevOps integrations
Azure DevOps
Developer Tools, Microsoft
intruder logo
About Intruder
Intruder is a vulnerability scanner that finds the cyber security weaknesses in your computer systems, before the hackers do.
Related categories