Get your automated security scanning pipeline running in minutes on Azure DevOps or GitHub Actions.
Download the pre-configured pipeline YML and place it in your repository.
bugslayer-pipeline.ymlazure-pipelines.yml · ~40 lines · Last updated today
bugslayer-pipeline.yml file you added to your repo root.GITHUB_TOKEN is not needed for Azure DevOps — skip it..yml name of your choice and place it in .github/workflows/ in your repository.trigger / pr keys with GitHub's on: push / pull_request format.${{ secrets.VAR_NAME }}.AZURE_DEVOPS_TOKEN is not needed for GitHub Actions — skip it.Provision a GCP VM that autonomously triages a target repo, generates patches, and opens GitHub PRs — powered by Claude Code and gitnexus.
git is on your PATH.gcloud auth application-default login).Installs python-dotenv and google-cloud-compute.
Create a .env file in the repo root (or export these in your shell). BugSlayer 2 loads them automatically at runtime via python-dotenv.
Point BugSlayer 2 at any public Git repo. It will spin up a GCP VM, clone the target, run the Claude Code triage agent, and send you the results.
gitnexus MCP server, clones the target repo, and runs the triage agent. When complete, four output files are written to /opt/orchestrator/ on the VM: ENTRYPOINTS.md, VULN_REPORT.md, POC.md, and PATCH.md. If a Discord webhook is configured, a zip of all outputs is posted automatically.
After a triage run, use the PR publisher to automatically open one GitHub pull request per patch section in PATCH.md.
repo scope in your environment:
PATCH.md and a local clone of the target repo:
## Patch N section in PATCH.md becomes a bugslayer/<slug>-<timestamp> branch and a scoped pull request. The local repo must be a clean clone of the same target repo the triage ran against.