What Integrates with CircleCI?
Find out what CircleCI integrations exist in 2026. Learn what software and services currently integrate with CircleCI, and sort them by reviews, cost, features, and more. Below is a list of products that CircleCI currently integrates with:
-
1
Defakto
Defakto
Defakto Security offers a robust platform that authenticates every automated interaction by providing temporary, verifiable identities to non-human entities like services, pipelines, AI agents, and machines, thereby removing the need for static credentials, API keys, and enduring privileges. Their comprehensive non-human identity and access management solution facilitates the identification of unmanaged identities across diverse environments such as cloud, on-premises, and hybrid settings, the issuance of dynamic identities in real time based on policy specifications, the enforcement of least-privilege access principles, and the generation of complete audit-ready logs. The solution comprises several modules: Ledger, which ensures ongoing discovery and governance of non-human identities; Mint, which automates the creation of purpose-specific, temporary identities; Ship, which enables secretless CI/CD workflows by eliminating hard-coded credentials; Trim, which optimizes access rights and eliminates excessive privileges for service accounts; and Mind, which safeguards AI agents and large language models using the same identity framework employed for workloads. Each module plays a critical role in enhancing security and streamlining identity management across various operational contexts. -
2
Micromerce
Micromerce
Micromerce is a versatile cloud software platform designed to enhance and automate the comprehensive processes involved in onboarding clients or partners, data migration, enablement, and ongoing support. By offering an all-in-one onboarding portal, back-office management system, and an automation layer, it allows organizations to efficiently handle, monitor, and streamline every step of the onboarding journey, from the sales hand-off to the activation phase, while providing clients with a transparent, step-by-step progression and minimizing the need for manual coordination. Additionally, for data migration tasks, it features a cohesive toolkit that accommodates various source formats, automates transformation and mapping, includes validation dashboards, and ensures complete visibility into the quality and status of the migration process. In terms of support and enablement, Micromerce incorporates AI-driven workflows, mechanisms to reduce ticket creation, integrated contextual assistance, and insightful analytics, all aimed at lessening the support burden and expediting customer activation. Ultimately, this platform empowers organizations to enhance their operational efficiency and improve client experiences significantly. -
3
Mondoo
Mondoo
Mondoo serves as a comprehensive platform for security and compliance, aiming to significantly mitigate critical vulnerabilities within businesses by merging complete asset visibility, risk assessment, and proactive remediation. It catalogs a thorough inventory of all types of assets, including cloud services, on-premises systems, SaaS applications, endpoints, network devices, and developer pipelines, while consistently evaluating their configurations, vulnerabilities, and interrelations. By incorporating business relevance, such as the importance of an asset, potential exploitation risks, and deviations from established policies, it effectively scores and identifies the most pressing threats. Users are provided with options for guided remediation through pre-tested code snippets and playbooks, or they can opt for autonomous remediation facilitated by orchestration pipelines, which include features for tracking, ticket generation, and verification. Additionally, Mondoo allows for the integration of third-party findings, works seamlessly with DevSecOps toolchains including CI/CD, Infrastructure as Code (IaC), and container registries, and boasts over 300 compliance frameworks and benchmark templates to ensure a thorough approach to security. Its robust functionality not only enhances organizational resilience but also streamlines compliance processes, offering a holistic solution for modern security challenges. -
4
aSISt
FINGO
Since 2007, financial institutions have been mandated to submit reports that adhere to the COREP and FINREP taxonomies using the XBRL standard. With the introduction of these regulations, numerous banks in Poland encountered significant difficulties. Not only were the reports challenging to compile, but there was also a notable absence of effective tools to assist in the management and preparation of XBRL reports. In response to this predicament, we collaborated with GPM Systems Sp. z o.o. to develop an application designed to facilitate the creation and management of these required filings in accordance with the XBRL format. The aSISt application effectively conceals the intricate technical aspects of XBRL behind an easy-to-use interface, greatly streamlining the filing process for users. The interface offers forms resembling Excel spreadsheets, enhancing the application's user-friendliness. Furthermore, the filing preparation has been distilled into four straightforward steps. aSISt is equipped to manage reporting periods and taxonomy versioning, ensuring that each report adheres to the appropriate version of the taxonomy selected. Additionally, this innovative solution not only improves efficiency but also helps banks maintain compliance with regulatory requirements. -
5
Sofy
Sofy
SOFY automates software testing. It uses machine learning to create test scenarios and suggests product changes. Software testing has never been easier. -
6
Provar
Provar Testing
Provar is the leading Salesforce testing solution. Provar is a Salesforce-first company and its mission is to support Salesforce-based companies that have built mission-critical apps. Provar is a pioneer in Salesforce DevOps and has been able to support some of the most complex Salesforce projects around the world. Learn more at provartesting.com -
7
Idobata
Eiwa System Management
Idobata is a dedicated platform designed to enhance team collaboration and software development, making the process enjoyable for developers. Crafted by developers specifically for their peers, it features a lightweight and familiar interface reminiscent of IRC. It seamlessly integrates with the tools widely utilized in the industry. Users can establish Organizations, which consist of various chat rooms tailored to different teams or projects. Members can either have full access to all rooms within an Organization or be restricted to specific chat spaces. Additionally, Idobata allows for the invitation of external users as guests, with customizable access limits to selected rooms. The Timeline view provides a comprehensive overview of all chat rooms across the Organization, ensuring that everyone stays updated. Idobata's webhooks facilitate the easy setup of notifications that connect with other development tools, offering well-crafted alerts for popular platforms like GitHub. You have the flexibility to customize which webhooks are employed for individual projects, and the option to create Custom Webhooks tailored to your specific needs. Moreover, Idobata supports Hubot integration, enabling users to develop and deploy bots that can perform a multitude of tasks within their chat rooms, enhancing overall productivity and efficiency. This innovative approach to team communication truly sets Idobata apart in the realm of software development tools. -
8
Contrast Assess
Contrast Security
A novel approach to security tailored to modern software development processes has emerged. By embedding security directly into the development toolchain, issues can be addressed within minutes of installation. Contrast agents actively monitor the code and provide insights from within the application, empowering developers to identify and resolve vulnerabilities without the need for specialized security personnel. This shift allows security teams to concentrate on governance and oversight. Additionally, Contrast Assess features an advanced agent that equips the application with intelligent sensors for real-time code analysis. This internal monitoring significantly reduces false positives, which often hinder both developers and security teams. By integrating seamlessly into existing software life cycles and aligning with the tools that development and operations teams currently utilize, including direct compatibility with ChatOps, ticketing platforms, and CI/CD pipelines, Contrast Assess simplifies the security process and enhances team efficiency. As a result, organizations can maintain a robust security posture while streamlining their development efforts. -
9
ConnectALL
ConnectALL
ConnectALL allows digital initiatives and IT to be aligned to business outcomes. It allows you to capture, visualize and analyze critical indicators of speed, quality, and efficiency in your software delivery value stream. ConnectALL automates the flow of product information throughout the value stream. This helps you to identify waste in people, tools, and processes, and improve cross-functional collaboration. ConnectALL tracks key performance indicators and metrics that drive speed, quality, and cost reductions. This allows you to identify growth opportunities and to understand your competitive advantages to stay ahead of the market. You can quickly identify roadblocks, missed release, bottlenecks, vulnerabilities, and constraints in processes, as well as trace the flow of work. ConnectALL allows you to identify and improve your value stream before it is too late. ConnectALL also offers tool integration and interoperability. -
10
Cider
Cider
Achieve detailed insight into engineering technologies, systems, and processes, all the way from the initial code to the final deployment. Effortlessly link Cider to your existing ecosystem while integrating security measures without disrupting engineering workflows. Enhance the security of your CI/CD pipeline by focusing on a customized set of prioritized risks and actionable recommendations suited to your specific environment. Cider flawlessly integrates with every component of your CI/CD process, delivering a thorough and precise evaluation of all technologies, frameworks, and integrations present in your setup. By mapping every intelligent connection in your environment, Cider offers complete visibility throughout the entire CI/CD journey, from source code management users to artifacts that are deployed in production. Evaluate the security posture of your engineering systems and processes comprehensively. Conduct an analysis of your environment against plausible attack scenarios to pinpoint necessary controls that will help minimize your CI/CD attack surface, ensuring a robust development cycle. This thorough assessment enables teams to proactively strengthen their defenses in an ever-evolving threat landscape. -
11
ThreatStryker
Deepfence
Runtime threat assessment, runtime attack analysis, and targeted protection of your infrastructure and applications. Zero-day attacks can be stopped by staying ahead of attackers. Observe attack behavior. ThreatStryker monitors, correlates, learns, and acts to protect your applications. Deepfence ThreatStryker displays a live, interactive, color-coded view on the topology and all processes and containers running. It inspects hosts and containers to find vulnerable components. It also interrogates configuration to identify file system, processes, and network-related misconfigurations. ThreatStryker uses industry and community standards to assess compliance. ThreatStryker conducts a deep inspection of network traffic, system behavior, and application behavior and accumulates suspicious events over time. The events are classified and correlated with known vulnerabilities and suspicious patterns. -
12
ThreatMapper
Deepfence
Open source, multi-cloud platform to scan, map, and rank vulnerabilities in containers, images hosts, repositories, and running containers. ThreatMapper detects threats to your applications in production across clouds, Kubernetes and serverless. You cannot secure what you can't see. ThreatMapper automatically discovers your production infrastructure. It can identify and interrogate cloud instances, Kubernetes nodes and serverless resources. This allows you to discover the applications and containers, and map their topology in real time. ThreatMapper allows you to visualize and discover the external and internal attack surfaces for your applications and infrastructure. Bad actors can gain access to your infrastructure by exploiting vulnerabilities in common dependencies. ThreatMapper scans hosts and containers for known vulnerable dependencies. It also takes threat feeds from more than 50 sources. -
13
Stackreaction
Stackreaction
Are you looking to create a marketplace, an online learning platform, or a membership site? Discover a variety of tools, integrations, workflows, and comprehensive guides to kickstart your project. You can explore various applications, identify alternatives, compare features, and provide your feedback. If you're interested in automating repetitive tasks, access a centralized hub for integrations from platforms like Zapier, Integromat, Automateio, and more, allowing you to compare pricing and functionalities. Delve into resources such as guides and tutorials offered by both the community and vendors. Share your expertise and knowledge, and tap into the collaborative spirit of the nocode community. Establish your profile, select your preferred tools, and showcase your tech stack to connect with others. Engaging with this vibrant community can foster innovation and inspire creativity in your endeavors. -
14
Chromatic
Chromatic
Chromatic captures precise snapshots of actual code, styles, and assets in a pixel-perfect manner. The tests mirror the experiences of your users directly. By leveraging the Storybook stories developed during the coding phase, Chromatic generates tests without the need for redundant writing. Our specialized detection algorithm effectively removes inconsistencies caused by latency, animations, loading resources, and variations in browser states. Chromatic offers a collaborative workspace tailored for designers, product managers, and various stakeholders to provide feedback and approve UI elements. You can post comments and requests for changes directly alongside your live components, ensuring transparency in the decision-making process. Additionally, you can automatically designate specific stakeholders to expedite the review of open pull requests, enhancing the efficiency of the approval process. This streamlined approach not only saves time but also fosters a more cohesive collaboration among team members. -
15
Clutch
Clutch
Clutch is tackling the increasingly vital issue of securing non-human identities in today’s enterprises. As digital frameworks grow and evolve, the oversight and safeguarding of non-human identities—including API keys, secrets, tokens, and service accounts—has become a crucial yet frequently overlooked element of cybersecurity. Acknowledging this oversight, Clutch is creating a specialized platform aimed at the thorough protection and management of these identities. Our innovative solution is intended to strengthen the digital infrastructure of organizations, promoting a secure, resilient, and reliable environment for their operations. The proliferation of non-human identities is staggering, outpacing human ones at a ratio of 45 to 1, and these identities hold significant privileges and extensive access that are indispensable for vital automated processes. Moreover, they often lack essential security measures like multi-factor authentication and conditional access policies, which makes their protection even more crucial. Addressing these vulnerabilities is key to ensuring the integrity of automated systems within enterprises. -
16
CoTester
TestGrid.io
CoTester stands as the pioneering AI agent for software testing, poised to revolutionize the field of software quality assurance. This innovative tool is capable of identifying bugs and performance problems both prior to and following deployment, delegating these issues to team members, and ensuring their resolution. Designed to be onboardable, taskable, and trainable, CoTester can perform daily tasks akin to a human software tester, smoothly fitting into current workflows. With its pre-training in advanced software testing principles and the Software Development Life Cycle (SDLC), it significantly enhances the efficiency of quality assurance teams by facilitating the writing, debugging, and execution of test cases at a speed up to 50% faster. Furthermore, CoTester exhibits conversational adaptability, enabling it to comprehend and address intricate testing scenarios while constructing high-quality context tailored to specific project needs. Its seamless integration with existing knowledge bases allows for effective access and utilization of current project documentation, making it an essential asset for any software development team. As a result, CoTester not only improves testing efficiency but also enhances collaboration among team members, ultimately contributing to superior software quality. -
17
Veracode
Veracode
Veracode provides a holistic and scalable solution to manage security risk across all your applications. Only one solution can provide visibility into the status of all types of testing, including manual penetration testing, SAST, DAST and SCA. -
18
Layer
Layer
Excel and Google Sheets are often delicate and susceptible to mistakes, leading to collaboration that frequently requires tedious and repetitive tasks. Files that hold significant information can break unexpectedly, frequently without anyone noticing, resulting in decisions based on inaccurate data. Highly compensated employees end up wasting countless hours on monotonous tasks, while workflows necessitate constant manual oversight, draining essential cognitive resources. You can selectively share portions of your file, whether that be specific cell ranges or entire sheets. With Layer, you can offload all these repetitive tasks efficiently. Every change is clearly marked for you, eliminating the need to search for updates. You will have access to a comprehensive record of modifications, spreadsheet iterations, and all communications. We are transforming the way teams collaborate on spreadsheets by adding a productivity layer to both Excel and Google Sheets. In truth, we have grown weary of the conventional perks that businesses provide today, as they often fall short of addressing the real challenges faced in collaborative work environments. By focusing on enhancing efficiency and reducing errors, we aim to redefine how teams interact with data.