Integrations

Connect ConsoleSentinel to your existing tools and workflows. All integrations support both real-time notifications and scheduled report delivery.

Slack

Send scan results, alerts, and summaries to any Slack channel.

Setup

  1. Create a Slack Incoming Webhook in your workspace settings.
  2. Add the webhook URL to your config:
{
  "integrations": {
    "slack": {
      "enabled": true,
      "webhookUrl": "${SLACK_WEBHOOK_URL}",
      "channel": "#qa-alerts",
      "notifyOn": ["critical", "high"],
      "includeSummary": true
    }
  }
}

What You Get

  • Formatted message with grade, score, and issue count
  • Color-coded severity indicators
  • Direct link to the full HTML report
  • Thread replies for individual critical findings

Microsoft Teams

Post scan results to a Teams channel via an Incoming Webhook connector.

Setup

{
  "integrations": {
    "teams": {
      "enabled": true,
      "webhookUrl": "${TEAMS_WEBHOOK_URL}",
      "notifyOn": ["critical", "high", "medium"]
    }
  }
}

Adaptive Cards

Teams notifications use Adaptive Cards for rich formatting — grade badge, issue breakdown by severity, and action buttons to open the full report.


PagerDuty

Trigger incidents for critical and high-severity findings.

Setup

{
  "integrations": {
    "pagerduty": {
      "enabled": true,
      "routingKey": "${PAGERDUTY_ROUTING_KEY}",
      "triggerOn": ["critical"],
      "severity": "error",
      "dedupKey": "consolesentinel-{url}-{date}"
    }
  }
}

PagerDuty integration uses the Events API v2. Incidents are auto-deduplicated using the dedupKey template so repeated scans do not spam your on-call.


Jira

Automatically create Jira issues for findings above a threshold.

Setup

{
  "integrations": {
    "jira": {
      "enabled": true,
      "host": "https://yourteam.atlassian.net",
      "email": "${JIRA_EMAIL}",
      "apiToken": "${JIRA_API_TOKEN}",
      "projectKey": "QA",
      "issueType": "Bug",
      "createOn": ["critical", "high"],
      "labels": ["consolesentinel", "automated"]
    }
  }
}

Behavior

  • One issue per unique finding (deduplicated by finding ID)
  • Auto-closes issues when the finding is resolved in a subsequent scan
  • Links to the full report and specific page URL where the issue was found

GitHub Issues

Create GitHub Issues directly from scan findings.

Setup

{
  "integrations": {
    "github": {
      "enabled": true,
      "token": "${GITHUB_TOKEN}",
      "owner": "your-org",
      "repo": "your-repo",
      "createOn": ["critical", "high"],
      "labels": ["bug", "consolesentinel"],
      "assignees": ["your-username"]
    }
  }
}

Works well with GitHub Actions — use the scan output to create issues in the same workflow.


Webhooks

Send raw JSON payloads to any HTTP endpoint for custom integrations.

Setup

{
  "integrations": {
    "webhooks": [
      {
        "url": "https://your-api.com/consolesentinel",
        "method": "POST",
        "headers": {
          "Authorization": "Bearer ${WEBHOOK_SECRET}",
          "Content-Type": "application/json"
        },
        "sendOn": ["complete", "critical"],
        "payload": "full"
      }
    ]
  }
}

Payload Schema

{
  "event": "scan.complete",
  "timestamp": "2026-03-15T14:30:00Z",
  "url": "https://example.com",
  "grade": "B+",
  "score": 82,
  "pages": 50,
  "findings": {
    "critical": 0,
    "high": 3,
    "medium": 18,
    "low": 12,
    "info": 4
  },
  "reportUrl": "https://dashboard.consolesentinel.dev/reports/abc123"
}

GitHub Actions

Run ConsoleSentinel in your CI pipeline:

name: ConsoleSentinel Audit
on:
  push:
    branches: [main]
  pull_request:
    branches: [main]

jobs:
  audit:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4
      - uses: actions/setup-node@v4
        with:
          node-version: 20
      - run: npm ci
      - run: npx consolesentinel --url ${{ secrets.DEPLOY_URL }} --fail-on-grade C --fail-on-critical -f json -q
      - uses: actions/upload-artifact@v4
        if: always()
        with:
          name: consolesentinel-report
          path: consolesentinel-reports/

Next Steps