Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.corridor.dev/llms.txt

Use this file to discover all available pages before exploring further.

Corridor’s Pull Request (PR) review feature acts as an automated security reviewer for your code changes. Whenever you open or update a PR, Corridor analyzes the diff for potential security issues and provides feedback directly in the PR.

Developer workflow

Treat Corridor’s comments like those from a human reviewer specialized in security:
  1. Understand the issue: Read the explanation and remediation guidance
  2. Push a fix: Push additional commits to address the problem. Corridor will re-check the PR on the new commit
  3. Handle false positives: If you believe it’s a false positive, mark it as such with feedback. This helps Corridor learn and helps the security team adjust guardrails
Once all issues are resolved, Corridor’s status check will turn green and you can merge knowing the security review is clear.

Configuration

PR review settings can be configured at two scopes:
  • Team-wide defaults apply to every project on the team. Configure them on the PR Reviews page → Configure (top right corner).
  • Per-project overrides apply to a single project and take precedence over the team default. Configure them on the project page → Settings. See Project Settings.
By default, a project inherits every setting from the team. When you override a setting on a project, only that setting is detached from the team default—other settings continue to inherit. Use Reset to Team Defaults on the project settings page to clear overrides and resume inheritance. See Connecting GitHub for initial setup.

Available settings

The table below applies to both team-wide defaults and per-project overrides, except where noted.
SettingDescription
Enable Pull Request ReviewsAutomatically review pull requests for security vulnerabilities
Block PRs with Security FindingsPrevent merging pull requests that contain security vulnerabilities (blocks can still be overridden in GitHub). Corridor Team only. Team-wide setting
Review Verbosity ModeControl how inclusive the PR reviewer is when flagging potential security issues. Standard review mode provides a balanced approach between catching vulnerabilities and minimizing false positives
Leave Comments on Pull RequestsPost review comments directly on GitHub PRs
Disable Comments for Specific ReposPRs from selected repositories will still be reviewed but comments won’t be posted. Team-wide setting—to disable commenting for a single project, turn off Leave Comments on Pull Requests in that project’s settings instead

Advanced settings

SettingDescription
Enable Draft PR ReviewsReview pull requests that are marked as draft
GitHub Label FilterOptionally restrict review comments to PRs with a specific label
Comment When No Issues FoundLeave a comment even when no vulnerabilities are detected
Minimum Severity to Comment OnOnly post PR comments for findings at or above the selected severity level (Medium, High, or Critical). Defaults to all issues
Enable Threat ModelingInclude threat model analysis with risk level and security considerations on all PRs

How it works

When a pull request is opened or updated:
  1. Webhook trigger: GitHub sends a webhook to Corridor
  2. Diff analysis: Corridor analyzes only the changed code, understanding context from the broader codebase
  3. Security review: The changes are evaluated against security best practices, known vulnerability patterns, and your guardrails
  4. Review posted: Findings appear directly on the PR with inline comments
  5. Corridor Review check: GitHub shows a Corridor Review check on your pull request. It moves from Queued to In progress while Corridor reviews your changes, and to Success when the review is finished. The check does not block merging on its own. Click Details to open this review in the Corridor dashboard.
Corridor’s reviews are context-aware—not just pattern matching. The review understands your codebase structure, existing security patterns, and the purpose of the changes. Each finding includes specific remediation steps, not generic advice.

Review limits

TierPR Reviews
Pro100/month
Team100/dev/month
EnterpriseUnlimited
Developer count is based on unique developers interacting with Corridor—IDE users, dashboard users, and PR authors—in the given month.

Next steps

Findings

Track and manage security findings

Guardrails

Configure real-time security guardrails