Skip to content

Enhance your workflow with extensions

Tools from the community and partners to simplify tasks and automate processes

    Warning

    We are deprecating GitHub Copilot Extensions on November 10, 2025, in favor of the Model Context Protocol (MCP). You can read more about this change in our changelog post.

    Deployment Protection Rules actions

    Enables custom protection rules to gate deployments with third-party services

    Checks if a user or users is whitelisted or a member of a team

    Validate minecraft java edition resource packs

    Custom action to send approval request to Slack from Github, allowing only specified approvers

    Checks the state of a gate and cancels the workflow if the gate state is closed

    A GitHub action for generating json schema from multiple values files for Helm3 charts

    Modify branch protection rules. Support for locking or unlocking a given branch.

    Require N number of PR approvals from a GitHub team. Enforce pre-merge PR checks more explicitly than CODEOWNERS file

    Handles deployment approvals via Slack

    Retrieve environment ID and auto-approve pending deployments in GitHub Actions

    Submits signing request to SignPath and downloads the signed artifact

    Check to see if the MySQL schemas for 2 DBs are the same

    Detect if a PR was merged as an administrator

    Compares the current version with the previous version to determine if the version has increased

    This action validates a timestamp against allowed and/or blocked time windows

    Open github issue and approval

    Checks if the version has changed since last release

    Check Kubernetes tools compatibility with your cluster version

    Connect to a May First web configuration server access shell SSH user

    Run the Grafbase Schema Checks

    Validate the Terraform plan against the code base and output if approval is needed