ArmorCode
Import consolidated security findings from ArmorCode's application security orchestration platform into the Guard Platform.
Overview
The ArmorCode integration connects the Praetorian Guard Platform (PGP) with your ArmorCode application security orchestration and correlation (ASOC) platform, importing consolidated security findings and vulnerability data into your attack surface. ArmorCode aggregates findings from dozens of security tools into a single unified view — PGP imports these correlated findings as risks so they can be managed alongside every other vulnerability source in your environment.
This integration is ideal for organizations using ArmorCode as their central security findings aggregator who want to bring that consolidated data into PGP for attack surface correlation and continuous testing. Instead of connecting PGP to each individual scanner separately, you can use ArmorCode as a single source of deduplicated, correlated findings that flow into PGP with full context.
What the Integration Does
When connected, PGP performs a read-only import from the ArmorCode REST API:
Security Findings as Risks: Findings from ArmorCode — including vulnerabilities from SAST, DAST, SCA, container scanning, cloud security, and other integrated tools — are imported as PGP risks. Severity ratings, tool source, and correlation context are preserved, and metadata including the affected asset, remediation guidance, and finding status is stored as proof artifacts.
Product and Sub-Product Inventory as Assets: ArmorCode products and sub-products (representing applications, services, and components) are imported as PGP assets, providing a structured inventory of your application landscape.
Affected Targets as Seeds: URLs, domains, and IP addresses associated with findings are imported as PGP seeds, feeding them into the Guard discovery and scanning pipeline.
Data flows one direction only — from ArmorCode into PGP. The integration never writes back to ArmorCode, modifies findings, or changes product configurations.
Prerequisites
Before setting up the integration, you need an ArmorCode API key:
Log in to your ArmorCode platform at your organization's ArmorCode URL
Navigate to Settings, then API Keys
Click Generate API Key
Assign the key read-only permissions for findings and products
Record the API Key — it is only shown once
Note your ArmorCode Tenant URL (e.g.,
https://app.armorcode.comor your custom tenant URL)
The API key must have permissions to read findings, products, and sub-products.
Setup
Go to Integrations, then Application Security, then ArmorCode in the Guard Platform
Enter your credentials in the setup form
Click Connect — PGP will validate your credentials by attempting to fetch your product inventory before saving
If validation fails, verify that your API key has the correct permissions and that the tenant URL is reachable.
What Data Is Synced
Security Findings
Each ArmorCode finding creates a PGP risk with:
Risk name: Derived from the finding title
Severity: Critical, High, Medium, Low, or Informational — preserved from the ArmorCode severity
Proof artifacts: Tool source (e.g., Checkmarx, Snyk, Prisma Cloud), finding category, affected asset, CWE/CVE identifiers, and remediation guidance
Description: Full vulnerability details and correlation context from ArmorCode
Status mapping: ArmorCode finding status maps to PGP status:
Products and Sub-Products
ArmorCode products are imported as assets with:
Asset name: Product or sub-product name
Asset type: Application
Metadata: Product ID, environment, team ownership, and associated tool integrations
Affected Targets
Targets associated with findings are imported as seeds:
API Endpoints Used
Base URL: Your ArmorCode tenant URL (e.g., https://app.armorcode.com)
All requests use API key authentication over HTTPS. The integration paginates through all findings in a single sync.
Troubleshooting
Security and Data Handling
Read-only access: The integration only reads data from ArmorCode. It never creates, modifies, or deletes findings, products, or configurations.
Credential handling: Your API Key is stored as an encrypted credential within PGP and is never exposed in logs or the UI after initial entry.
Authentication: The API key is transmitted in the request header over HTTPS to the ArmorCode API.
Data filtering: Risks pass through PGP standard VM filter rules, allowing you to control which severity levels or finding categories are imported.