Integrations
Connect ConsoleSentinel to your existing tools and workflows. All integrations support both real-time notifications and scheduled report delivery.
Slack
Send scan results, alerts, and summaries to any Slack channel.
Setup
- Create a Slack Incoming Webhook in your workspace settings.
- Add the webhook URL to your config:
{
"integrations": {
"slack": {
"enabled": true,
"webhookUrl": "${SLACK_WEBHOOK_URL}",
"channel": "#qa-alerts",
"notifyOn": ["critical", "high"],
"includeSummary": true
}
}
}
What You Get
- Formatted message with grade, score, and issue count
- Color-coded severity indicators
- Direct link to the full HTML report
- Thread replies for individual critical findings
Microsoft Teams
Post scan results to a Teams channel via an Incoming Webhook connector.
Setup
{
"integrations": {
"teams": {
"enabled": true,
"webhookUrl": "${TEAMS_WEBHOOK_URL}",
"notifyOn": ["critical", "high", "medium"]
}
}
}
Adaptive Cards
Teams notifications use Adaptive Cards for rich formatting — grade badge, issue breakdown by severity, and action buttons to open the full report.
PagerDuty
Trigger incidents for critical and high-severity findings.
Setup
{
"integrations": {
"pagerduty": {
"enabled": true,
"routingKey": "${PAGERDUTY_ROUTING_KEY}",
"triggerOn": ["critical"],
"severity": "error",
"dedupKey": "consolesentinel-{url}-{date}"
}
}
}
PagerDuty integration uses the Events API v2. Incidents are auto-deduplicated
using the dedupKey template so repeated scans do not spam your on-call.
Jira
Automatically create Jira issues for findings above a threshold.
Setup
{
"integrations": {
"jira": {
"enabled": true,
"host": "https://yourteam.atlassian.net",
"email": "${JIRA_EMAIL}",
"apiToken": "${JIRA_API_TOKEN}",
"projectKey": "QA",
"issueType": "Bug",
"createOn": ["critical", "high"],
"labels": ["consolesentinel", "automated"]
}
}
}
Behavior
- One issue per unique finding (deduplicated by finding ID)
- Auto-closes issues when the finding is resolved in a subsequent scan
- Links to the full report and specific page URL where the issue was found
GitHub Issues
Create GitHub Issues directly from scan findings.
Setup
{
"integrations": {
"github": {
"enabled": true,
"token": "${GITHUB_TOKEN}",
"owner": "your-org",
"repo": "your-repo",
"createOn": ["critical", "high"],
"labels": ["bug", "consolesentinel"],
"assignees": ["your-username"]
}
}
}
Works well with GitHub Actions — use the scan output to create issues in the same workflow.
Webhooks
Send raw JSON payloads to any HTTP endpoint for custom integrations.
Setup
{
"integrations": {
"webhooks": [
{
"url": "https://your-api.com/consolesentinel",
"method": "POST",
"headers": {
"Authorization": "Bearer ${WEBHOOK_SECRET}",
"Content-Type": "application/json"
},
"sendOn": ["complete", "critical"],
"payload": "full"
}
]
}
}
Payload Schema
{
"event": "scan.complete",
"timestamp": "2026-03-15T14:30:00Z",
"url": "https://example.com",
"grade": "B+",
"score": 82,
"pages": 50,
"findings": {
"critical": 0,
"high": 3,
"medium": 18,
"low": 12,
"info": 4
},
"reportUrl": "https://dashboard.consolesentinel.dev/reports/abc123"
}
GitHub Actions
Run ConsoleSentinel in your CI pipeline:
name: ConsoleSentinel Audit
on:
push:
branches: [main]
pull_request:
branches: [main]
jobs:
audit:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: actions/setup-node@v4
with:
node-version: 20
- run: npm ci
- run: npx consolesentinel --url ${{ secrets.DEPLOY_URL }} --fail-on-grade C --fail-on-critical -f json -q
- uses: actions/upload-artifact@v4
if: always()
with:
name: consolesentinel-report
path: consolesentinel-reports/
Next Steps
- API Reference — Use ConsoleSentinel programmatically
- Configuration — Full config file reference