From 1c557b0be4036aff60ef0467c5652725310dddb9 Mon Sep 17 00:00:00 2001
From: "tembo[bot]" <208362400+tembo[bot]@users.noreply.github.com>
Date: Mon, 18 May 2026 13:44:50 +0000
Subject: [PATCH] docs(integrations): add Snyk integration docs and logo assets
Co-authored-by: Darren <68653294+DarrenBaldwin07@users.noreply.github.com>
---
docs.json | 1 +
images/integrations/snyk.svg | 4 +++
integrations/snyk.mdx | 51 ++++++++++++++++++++++++++++++++++++
3 files changed, 56 insertions(+)
create mode 100644 images/integrations/snyk.svg
create mode 100644 integrations/snyk.mdx
diff --git a/docs.json b/docs.json
index b55623e..8d22f20 100644
--- a/docs.json
+++ b/docs.json
@@ -102,6 +102,7 @@
"integrations/postgres",
"integrations/raycast",
"integrations/sentry",
+ "integrations/snyk",
"integrations/slack",
"integrations/supabase",
"integrations/aws",
diff --git a/images/integrations/snyk.svg b/images/integrations/snyk.svg
new file mode 100644
index 0000000..3dfc693
--- /dev/null
+++ b/images/integrations/snyk.svg
@@ -0,0 +1,4 @@
+
diff --git a/integrations/snyk.mdx b/integrations/snyk.mdx
new file mode 100644
index 0000000..89aed6a
--- /dev/null
+++ b/integrations/snyk.mdx
@@ -0,0 +1,51 @@
+---
+title: "Snyk"
+description: "Security scanning context for dependencies, code, IaC, and containers."
+---
+
+
+
+
+
+## Features
+
+- OAuth connection to your Snyk organization
+- MCP server access to Snyk security data during agent sessions
+- Support for dependency, code, IaC, and container security scanning workflows
+- Automatic token refresh for OAuth connections
+
+## Installation
+
+
+
+ Go to [Integrations](https://app.tembo.io/integrations) and click **Install** next to Snyk.
+
+
+ Approve Tembo in Snyk to grant access to your account and organizations.
+
+
+ After connecting, Tembo uses your connected Snyk organization context for MCP requests.
+
+
+
+## Usage
+
+Once connected, the Snyk MCP server is automatically available to agents. They can query Snyk data and use that context while working on security-related tasks in your repositories.
+
+Use this when you want Tembo to reason about known security findings from Snyk while generating fixes, reviews, or remediation plans.
+
+## Advanced
+
+
+
+ Tembo starts the official Snyk MCP server automatically for sessions and injects your Snyk auth token securely.
+
+
+
+ Tembo uses OAuth by default and refreshes expired access tokens automatically. If your connection is missing a valid OAuth token, reconnect the Snyk integration.
+
+
+
+ If agents cannot access expected Snyk data, verify the Snyk account you authorized has access to the correct organization and projects, then reconnect from the [Integrations page](https://app.tembo.io/integrations).
+
+