A step-by-step guide to installing MergeShield, running your first risk analysis, understanding scores, and configuring auto-merge for your GitHub repositories.
By the end of this guide, you'll have MergeShield running on your GitHub repositories with automatic risk analysis on every pull request. Here's what the setup involves:
The entire process takes about 5 minutes. No server setup, no infrastructure, no YAML files.
Note
Already want to jump straight in? Try the interactive Quick Start walkthrough for a visual step-by-step.
Head to mergeshield.dev and click "Get Started with GitHub." You'll be redirected to GitHub to authorize the MergeShield app.
During installation, you'll choose which repositories to grant access to. You can start with a single repository to test things out, or install across your entire organization.
MergeShield requires these permissions:
Once installed, MergeShield automatically syncs your repositories and begins monitoring for new pull requests. You'll see your repos appear in the dashboard within seconds.
Tip
Start with one or two active repositories. You can always add more later from the dashboard settings.
Open a new pull request in any repository where MergeShield is installed — or push a new commit to an existing PR. Within 30 seconds, MergeShield posts a detailed risk analysis comment directly on the PR.
The comment includes:
This comment is the core of MergeShield's value. Your team sees the risk assessment right where they already review code — no new tools, no dashboards to check, no context switching.
Note
If an AI agent authored the PR, MergeShield automatically detects it and shows the agent's identity and trust level in the comment.
MergeShield evaluates every PR across six independent dimensions:
Each dimension gets a score from 0 (no risk) to 100 (critical risk). The overall score uses a weighted formula: max × 0.4 + avg × 0.6. This ensures that one high-risk dimension can't hide behind low scores in other areas.
Scores map to four severity levels:
Tip
Focus on the individual dimension scores, not just the overall number. A Medium-risk PR with a High security score deserves attention even though the overall score seems manageable.
Once you're comfortable with MergeShield's scoring, you can enable auto-merge for low-risk PRs. Navigate to your repository settings in the MergeShield dashboard and toggle auto-merge on.
The default configuration is deliberately conservative:
You can adjust every parameter to match your team's risk tolerance.
Auto-merge is particularly powerful for AI agent PRs. When Dependabot opens a routine dependency bump that scores 5/100, there's no reason for a human to review it. MergeShield merges it automatically after the cooldown, freeing your team to focus on the changes that actually need attention.
Warning
Always start with auto-merge disabled and review MergeShield's scores for a few days before enabling it. This helps you calibrate thresholds to your codebase.
You're now up and running with MergeShield. Here's what to explore next:
*.env*), specific authors, or critical pathsuses: mergeshield/risk-check@v1 for even tighter integrationAll of these features are configurable from the dashboard. Start simple and progressively enable more governance as your team's confidence grows.
Tip
Check out the interactive guide walkthroughs — each one has a hands-on animated walkthrough that shows you exactly how the feature works.
Dive deeper with interactive walkthroughs
Quick Start Walkthrough
Interactive animated walkthrough showing the full MergeShield setup flow.
Read guideConfiguring Auto-Merge
Deep dive into the 7 merge rules, cooldown windows, and dry-run preview.
Read guideUnderstanding Risk Scores
How the AI pipeline scores PRs and what each dimension means.
Read guide