Integrate Promptfoo with SonarQube
This guide demonstrates how to integrate Promptfoo's scanning results into SonarQube, allowing red team findings to appear in your normal "Issues" view, participate in Quality Gates, and block pipelines when they breach security policies.
This feature is available in Promptfoo Enterprise.
Overview
The integration uses SonarQube's Generic Issue Import feature to import Promptfoo findings without requiring any custom plugins. This approach:
- Surfaces LLM security issues alongside traditional code quality metrics
- Enables Quality Gate enforcement for prompt injection and other LLM vulnerabilities
- Provides a familiar developer experience within the existing SonarQube UI
- Works with any CI/CD system that supports SonarQube
Prerequisites
- SonarQube server (Community Edition or higher)
- SonarQube Scanner installed in your CI/CD environment
- Node.js installed in your CI/CD environment
- A Promptfoo configuration file
Configuration Steps
1. Basic CI/CD Integration
Here's an example GitHub Actions workflow that runs Promptfoo and imports results into SonarQube:
name: SonarQube Analysis with Promptfoo
on:
push:
branches: [main, develop]
pull_request:
branches: [main]
jobs:
analysis:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
with:
fetch-depth: 0 # Shallow clones should be disabled for better analysis
- name: Setup Node.js
uses: actions/setup-node@v4
with:
node-version: '18'
- name: Install Promptfoo
run: npm install -g promptfoo
- name: Run Promptfoo scan
run: |
promptfoo eval \
--config promptfooconfig.yaml \
--output pf-sonar.json \
--output-format sonarqube
- name: SonarQube Scan
env:
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
SONAR_HOST_URL: ${{ secrets.SONAR_HOST_URL }}
run: |
sonar-scanner \
-Dsonar.projectKey=${{ github.event.repository.name }} \
-Dsonar.sources=. \
-Dsonar.externalIssuesReportPaths=pf-sonar.json
2. Advanced Pipeline Configuration
For enterprise environments, here's a more comprehensive setup with caching, conditional execution, and detailed reporting:
name: Advanced SonarQube Integration
on:
push:
branches: [main, develop]
pull_request:
branches: [main]
schedule:
- cron: '0 2 * * *' # Daily security scan
jobs:
promptfoo-security-scan:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
with:
fetch-depth: 0
- name: Setup Node.js
uses: actions/setup-node@v4
with:
node-version: '18'
- name: Cache promptfoo
uses: actions/cache@v3
with:
path: ~/.cache/promptfoo
key: ${{ runner.os }}-promptfoo-${{ hashFiles('**/promptfooconfig.yaml') }}
restore-keys: |
${{ runner.os }}-promptfoo-
- name: Install dependencies
run: |
npm install -g promptfoo
npm install -g jsonschema
- name: Validate promptfoo config
run: |
# Validate configuration before running
promptfoo validate --config promptfooconfig.yaml
- name: Run red team evaluation
id: redteam
env:
PROMPTFOO_CACHE_PATH: ~/.cache/promptfoo
run: |
# Run with failure threshold
promptfoo eval \
--config promptfooconfig.yaml \
--output pf-results.json \
--output-format json \
--max-concurrency 5 \
--share || echo "EVAL_FAILED=true" >> $GITHUB_OUTPUT
- name: Generate multiple report formats
if: always()
run: |
# Generate SonarQube format
promptfoo eval \
--config promptfooconfig.yaml \
--output pf-sonar.json \
--output-format sonarqube \
--no-cache
# Also generate HTML report for artifacts
promptfoo eval \
--config promptfooconfig.yaml \
--output pf-results.html \
--output-format html \
--no-cache
- name: SonarQube Scan
if: always()
uses: SonarSource/sonarqube-scan-action@master
env:
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
SONAR_HOST_URL: ${{ secrets.SONAR_HOST_URL }}
with:
args: >
-Dsonar.projectKey=${{ github.event.repository.name }}
-Dsonar.externalIssuesReportPaths=pf-sonar.json
-Dsonar.pullrequest.key=${{ github.event.pull_request.number }}
-Dsonar.pullrequest.branch=${{ github.head_ref }}
-Dsonar.pullrequest.base=${{ github.base_ref }}
- name: Check Quality Gate
uses: SonarSource/sonarqube-quality-gate-action@master
timeout-minutes: 5
env:
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
- name: Upload artifacts
if: always()
uses: actions/upload-artifact@v3
with:
name: promptfoo-reports
path: |
pf-results.json
pf-results.html
pf-sonar.json
retention-days: 30
- name: Comment PR with results
if: github.event_name == 'pull_request' && always()
uses: actions/github-script@v7
with:
script: |
const fs = require('fs');
const results = JSON.parse(fs.readFileSync('pf-results.json', 'utf8'));
const stats = results.results.stats;
const comment = `## 🔒 Promptfoo Security Scan Results
- **Total Tests**: ${stats.successes + stats.failures}
- **Passed**: ${stats.successes} ✅
- **Failed**: ${stats.failures} ❌
${results.shareableUrl ? `[View detailed results](${results.shareableUrl})` : ''}
Issues have been imported to SonarQube for tracking.`;
github.rest.issues.createComment({
issue_number: context.issue.number,
owner: context.repo.owner,
repo: context.repo.repo,
body: comment
});
3. Configure SonarQube
To properly display and track promptfoo findings in SonarQube:
-
Create Custom Rules (optional):
# Example API call to create a custom rule
curl -u admin:$SONAR_PASSWORD -X POST \
"$SONAR_HOST/api/rules/create" \
-d "custom_key=PF-Prompt-Injection" \
-d "name=Prompt Injection Vulnerability" \
-d "markdown_description=Potential prompt injection vulnerability detected" \
-d "severity=CRITICAL" \
-d "type=VULNERABILITY" -
Configure Quality Gate:
- Navigate to Quality Gates in SonarQube
- Add condition: "Security Rating is worse than A"
- Add condition: "Security Hotspots Reviewed is less than 100%"
- Add custom condition: "Issues from promptfoo > 0" (for critical findings)
-
Set Up Notifications:
- Configure webhooks to notify on Quality Gate failures
- Set up email notifications for security findings
4. Jenkins Integration
If using Jenkins instead of GitHub Actions:
pipeline {
agent any
environment {
SONAR_TOKEN = credentials('sonar-token')
}
stages {
stage('Checkout') {
steps {
checkout scm
}
}
stage('Run Promptfoo') {
steps {
sh '''
npm install -g promptfoo
promptfoo eval \
--config promptfooconfig.yaml \
--output pf-sonar.json \
--output-format sonarqube
'''
}
}
stage('SonarQube Analysis') {
steps {
withSonarQubeEnv('SonarQube') {
sh '''
sonar-scanner \
-Dsonar.projectKey=${JOB_NAME} \
-Dsonar.sources=. \
-Dsonar.externalIssuesReportPaths=pf-sonar.json
'''
}
}
}
stage('Quality Gate') {
steps {
timeout(time: 1, unit: 'HOURS') {
waitForQualityGate abortPipeline: true
}
}
}
}
post {
always {
archiveArtifacts artifacts: '*.json,*.html', fingerprint: true
}
}
}
Next Steps
For more information on Promptfoo configuration and red team testing, refer to the red team documentation.