Overview
The Hopper GitLab integration connects to GitLab.com or self-managed instances using read-only Git access to scan your codebase and dependencies. It identifies only exploitable vulnerabilities through function-level reachability, flags license violations, and generates SBOMs—all without modifying code, requiring CI/CD integration, or disrupting developer workflows.
Capabilities
- Auto-discovers GitLab repositories via group- or project-level access
- Clone source code over Git (HTTPS or SSH) for static analysis
- Detects direct and transitive open-source dependencies
- Identifies only exploitable vulnerabilities using function-level reachability
- Detects license violations based on organizational policy
- Generates SBOMs in SPDX and CycloneDX format
- Provides developer-centric remediation guidance including call graphs and fix effort
Requirements
- Hopper account
- GitLab.com
- A GitLab user or machine account with:
- read_repository access (via Personal Access Token or GitLab App)
- Access to the relevant groups or projects
Setup Instructions
- Log in to the Hopper platform.
- Navigate to Integrations > GitLab.
- Enter a GitLab access token with a “read_repository” permission
- Hopper will begin cloning and analyzing repositories immediately—no CI/CD configuration required.
Permissions
Hopper uses read-only access and requires only the following:
- Read access to repository metadata (names, paths, branches)
- Read access to file contents for static analysis
The integration does not:
- Modify any code, commits, or branches
- Require admin access or write permissions
- Access your CI pipelines, secrets, or deployment infrastructure
Security and Data Handling
- Hopper connects over HTTPS or SSH, using secure authentication via GitLab tokens.
- Source code is cloned temporarily for analysis and is not stored persistently.
- All analysis occurs in memory or isolated environments, and no files are written back to GitLab.
- Hopper does not access CI/CD jobs or build environments.
When used alongside a build or artifact integration (e.g., JFrog), Hopper may correlate results across source and binary analysis.
Output
The GitLab integration generates the following output in the Hopper platform:
- Reachable vulnerabilities with:
- CVE ID, severity, package name and version
Call graphs and file/function usage context - Fix effort estimates and upgrade recommendations
- CVE ID, severity, package name and version
- License policy violations
- Flagged by license type (e.g., GPL, AGPL, LGPL)
- Linked to specific dependencies and affected paths
- Exportable SBOMs
- Formats: SPDX and CycloneDX
- Includes full dependency tree with license and version info
- Detailed repository-level risk dashboards
Support
For troubleshooting or technical questions, contact: support@hopper.security