Overview
Corgea Agent is an AI-powered assistant that helps you manage security vulnerabilities in your codebase. It provides two main interaction modes:- Web Chat Interface - An interactive chat for exploring security issues, scans, and vulnerability data
- Pull Request Comments - Automated responses to commands in PR comments across GitHub, GitLab, Azure DevOps, and Bitbucket
Getting Started
Prerequisites
Before enabling Corgea Agent, ensure you have:- Active Corgea account with appropriate plan access
- At least one integration configured (GitHub, GitLab, Azure DevOps, or Bitbucket)
- Webhook events properly configured for your repository
Initial Setup
Enable Corgea Agent
Navigate to Settings > Agent Settings in your Corgea dashboard and toggle the “Enable Corgea Agent” switch to activate the agent. Once enabled, the agent will begin monitoring PR comments and be available for chat.

Verify Permissions
Ensure your Corgea integration has necessary permissions to:
- Read pull request comments
- Post comments on pull requests
- Access repository content
Web Chat Interface
Accessing the Chat
Navigate to the Chat section in your Corgea dashboard to access the interactive AI assistant.
What You Can Do
The Corgea Agent has deep knowledge of your security posture and can help you:Explore Security Issues
Get detailed information about specific vulnerabilities, understand severity levels, and review fix suggestions
Analyze Scans
Review scan results and summaries, compare scans over time, and understand scan coverage
Query Vulnerability Data
List issues by severity, project, or type, and review blocking rules and policy violations
Example Queries
Example Chat Queries

Pull Request Interactions
How It Works
When Corgea detects security issues in a pull request, the agent automatically:- Posts comments highlighting the vulnerabilities
- Monitors the PR for developer responses
- Interprets developer intent from comments
- Takes automated actions based on commands

Triggering the Agent
The agent responds to comments that:- Explicitly mention
@Corgea - Reply directly to Corgea’s issue comment
- Contain recognizable action commands
- Are directed at addressing security findings
You don’t need to use
@Corgea as the agent will respond to comments to it’s own.Supported Actions
Mark as False Positive
Mark as False Positive
Indicate that a reported issue is not actually a vulnerability.Example Comments:What Happens:
- Issue is marked as “False Positive”
- Issue is removed from blocking status
- Feedback is recorded for analysis
Mark as Accepted Risk
Mark as Accepted Risk
Acknowledge a real vulnerability but accept the risk without immediate remediation.Example Comments:What Happens:
- Issue status changes to “Accepted Risk”
- Issue no longer blocks PR
- Risk acceptance is logged
Mark as Fixed
Mark as Fixed
Confirm that a vulnerability has been resolved.Example Comments:What Happens:
- Issue status changes to “Fixed”
- Issue no longer appears in active findings
- Fix confirmation is recorded
Mark as Duplicate
Mark as Duplicate
Flag an issue as a duplicate of an existing finding.Example Comments:What Happens:
- Issue is marked as duplicate
- Linked to original issue (if specified)
- Removed from active count
Mark as In Progress
Mark as In Progress
Indicate that work is underway to fix the issue.Example Comments:What Happens:
- Issue status changes to “Fix In Progress”
- Tracked as actively being addressed
- Team can monitor progress
Request More Information
Request More Information
Ask Corgea for additional details about a vulnerability.Example Comments:What Happens:
- Agent provides detailed explanation
- Includes vulnerability context and remediation guidance
- May suggest related resources
Comment Interaction Examples
- False Positive
- Accepted Risk
- Request Context
Scenario: Developer disagrees with findingAgent Response:
PR Comment
Feedback History
View all PR comment interactions in the Feedback History section:- See all actions taken via PR comments
- Filter by action type, user, or date range
- Review AI confidence scores for interpretations
- Monitor team engagement with security findings

- Action Type (False Positive, Accepted Risk, Fixed, etc.)
- GitHub/GitLab/Azure DevOps user
- Date range
Supported Platforms
Corgea Agent works seamlessly across multiple development platforms:- GitHub
- GitLab
- Azure DevOps
- Bitbucket
- Pull request comments
- Issue comments
- Review threads
Requires: GitHub App installation with appropriate permissions
Troubleshooting
Agent Not Responding to PR Comments
Agent Not Responding to PR Comments
Check:
- Is the agent enabled in Settings > Agent Settings?
- Are webhooks properly configured for your repository?
- Did you mention
@Corgeaor reply to an agent comment? - Is your integration active and properly authenticated?
- Verify webhook delivery in your platform’s webhook settings
- Check integration status in Corgea dashboard
- Re-authenticate if needed
Action Not Applied to Issue
Action Not Applied to Issue
Check:
- Does your comment clearly state the intended action?
- Are you commenting on the correct issue?
- Do you have permissions to modify issues?
- Use explicit commands like “@Corgea false positive”
- Check the Feedback History to see how your comment was interpreted
- Verify AI confidence score - low confidence may prevent action execution
Chat Not Loading or Responding
Chat Not Loading or Responding
Check:
- Browser console for JavaScript errors
- Network connectivity
- Account permissions
- Refresh the page
- Clear browser cache
- Contact support if issue persists
Low Confidence Interpretations
Low Confidence Interpretations
If the agent frequently misinterprets your comments:Best Practices:
- Use clear action words: “false positive”, “fixed”, “accept risk”
- Provide context when needed
- Avoid ambiguous language
Best Practices
- PR Comments
- Web Chat
One Action Per Comment: Keep comments focused on a single action
Provide Context: Add reasoning to help the team understand your decision
Review Feedback History: Periodically check how your commands are interpreted
Privacy & Security
- PR comment actions are logged and auditable in Feedback History
- Agent responses never expose sensitive credentials or internal implementation details
- Data is processed in compliance with Corgea’s security standards
