Skip to content

Commit 337f17b

Browse files
authored
Merge pull request #42299 from github/repo-sync
Repo sync
2 parents 1dfda1a + 36915a1 commit 337f17b

File tree

33 files changed

+710
-4139
lines changed

33 files changed

+710
-4139
lines changed
Lines changed: 28 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: About Dependabot alerts
3-
intro: '{% data variables.product.github %} sends {% data variables.product.prodname_dependabot_alerts %} when we detect that your repository uses a vulnerable dependency.'
3+
intro: '{% data variables.product.prodname_dependabot_alerts %} help you find and fix vulnerable dependencies before they become security risks.'
44
product: '{% data reusables.gated-features.dependabot-alerts %}'
55
redirect_from:
66
- /articles/about-security-alerts-for-vulnerable-dependencies
@@ -23,87 +23,61 @@ topics:
2323
shortTitle: Dependabot alerts
2424
contentType: concepts
2525
---
26-
<!--Marketing-LINK: From /features/security/software-supply-chain page "About alerts for vulnerable dependencies ".-->
2726

28-
{% data variables.product.prodname_dependabot_alerts %} tell you when your code depends on a package that is insecure. Often, software is built using open-source code packages from a large variety of sources. The complex relationships between these dependencies, and the ease with which malicious actors can insert malware into upstream code, mean that you may unknowingly be using dependencies that have security flaws, also known as vulnerabilities.
27+
Software often relies on packages from various sources, creating dependency relationships that can unknowingly introduce security vulnerabilities. When your code depends on packages with known security vulnerabilities, you become a target for attackers seeking to exploit your system—potentially gaining access to your code, data, customers, or contributors. {% data variables.product.prodname_dependabot_alerts %} notify you about vulnerable dependencies so you can upgrade to secure versions and protect your project.
2928

30-
If your code depends on a package with a security vulnerability, this can cause a range of problems for your project or the people who use it. Using a vulnerable package makes you a soft target for malicious users looking to exploit your system. For example, they may seek to get access to your code and data from your customers or contributors. You should upgrade to a secure version of the package as soon as possible. If your code uses malware, you need to replace the package with a secure alternative.
29+
## When {% data variables.product.prodname_dependabot %} sends alerts
3130

32-
{% data reusables.dependabot.no-dependabot-alerts-for-malware %}
33-
34-
{% data reusables.dependabot.quickstart-link %}
35-
36-
## Detection of insecure dependencies
37-
38-
{% data variables.product.prodname_dependabot %} performs a scan of the default branch of your repository to detect insecure dependencies, and sends {% data variables.product.prodname_dependabot_alerts %} when:
31+
{% data variables.product.prodname_dependabot %} scans your repository's default branch and sends alerts when:
3932

4033
{% ifversion fpt or ghec %}
41-
* A new advisory is added to the {% data variables.product.prodname_advisory_database %}. For more information, see [AUTOTITLE](/code-security/security-advisories/working-with-global-security-advisories-from-the-github-advisory-database/browsing-security-advisories-in-the-github-advisory-database).{% else %}
42-
34+
* A new vulnerability is added to the {% data variables.product.prodname_advisory_database %}{% else %}
4335
* New advisory data is synchronized to {% data variables.product.prodname_dotcom %} each hour from {% data variables.product.prodname_dotcom_the_website %}. {% data reusables.security-advisory.link-browsing-advisory-db %}{% endif %}
36+
* Your dependency graph changes—for example, when you push commits that update packages or versions
4437

45-
> [!NOTE]
46-
> Only advisories that have been reviewed by {% data variables.product.company_short %} will trigger {% data variables.product.prodname_dependabot_alerts %}.
47-
48-
* The dependency graph for a repository changes. For example, when a contributor pushes a commit to change the packages or versions it depends on{% ifversion fpt or ghec %}, or when the code of one of the dependencies changes{% endif %}. For more information, see [AUTOTITLE](/code-security/supply-chain-security/understanding-your-software-supply-chain/about-the-dependency-graph).
38+
For supported ecosystems, see [AUTOTITLE](/code-security/supply-chain-security/understanding-your-software-supply-chain/dependency-graph-supported-package-ecosystems#supported-package-ecosystems).
4939

50-
> [!NOTE]
51-
> {% data variables.product.prodname_dependabot %} doesn't scan archived repositories.
40+
## Understanding alerts
5241

53-
{% data reusables.repositories.dependency-review %}
42+
When {% data variables.product.github %} detects a vulnerable dependency, a {% data variables.product.prodname_dependabot %} alert appears on the repository's **Security** tab and dependency graph. Each alert includes:
5443

55-
As {% data variables.product.prodname_dependabot_alerts %} rely on the dependency graph, the ecosystems that are supported by {% data variables.product.prodname_dependabot_alerts %} are the same as those supported by the dependency graph. For a list of these ecosystems, see [AUTOTITLE](/code-security/supply-chain-security/understanding-your-software-supply-chain/dependency-graph-supported-package-ecosystems#supported-package-ecosystems).
44+
* A link to the affected file
45+
* Details about the vulnerability and its severity
46+
* Information about a fixed version (when available)
5647

57-
> [!NOTE]
58-
> It is important to keep your manifest and lock files up to date. If the dependency graph doesn't accurately reflect your current dependencies and versions, then you could miss alerts for insecure dependencies that you use. You may also get alerts for dependencies that you no longer use.
48+
For information about notifications, viewing, and managing alerts, see [AUTOTITLE](/code-security/dependabot/dependabot-alerts/viewing-and-updating-dependabot-alerts).
5949

60-
{% data reusables.dependabot.dependabot-alert-actions-semver %}
50+
## Enabling alerts
6151

62-
## Configuration of {% data variables.product.prodname_dependabot_alerts %}
52+
Repository administrators and organization owners can enable {% data variables.product.prodname_dependabot_alerts %} for their repositories{% ifversion fpt or ghec %} and organizations{% endif %}. When enabled, {% data variables.product.github %} immediately generates the dependency graph and creates alerts for any vulnerable dependencies it identifies. By default, people with write, maintain, or admin permissions receive notifications.{% ifversion fpt or ghec %} Repository administrators can grant access to additional people or teams.{% endif %}
6353

6454
{% data reusables.repositories.enable-security-alerts %}
6555

66-
{% ifversion fpt or ghec %}Repository owners or people with admin access can enable {% data variables.product.prodname_dependabot_alerts %} for their repositories. You can also enable or disable {% data variables.product.prodname_dependabot_alerts %} for all repositories owned by your user account or organization. For more information, see [AUTOTITLE](/code-security/dependabot/dependabot-alerts/configuring-dependabot-alerts).
67-
68-
For information about access requirements for actions related to {% data variables.product.prodname_dependabot_alerts %}, see [AUTOTITLE](/organizations/managing-user-access-to-your-organizations-repositories/managing-repository-roles/repository-roles-for-an-organization#access-requirements-for-security-features).
69-
70-
{% data variables.product.github %} starts generating the dependency graph immediately and generates alerts for any insecure dependencies as soon as they are identified. The graph is usually populated within minutes but this may take longer for repositories with many dependencies. For more information, see [AUTOTITLE](/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-security-and-analysis-settings-for-your-repository#enabling-or-disabling-security-and-analysis-features-for-private-repositories).
71-
{% endif %}
72-
73-
When {% data variables.product.github %} identifies a vulnerable dependency, we generate a {% data variables.product.prodname_dependabot %} alert and display it on the **Security** tab for the repository and in the repository's dependency graph. The alert includes a link to the affected file in the project, and information about a fixed version.
56+
See [AUTOTITLE](/code-security/dependabot/dependabot-alerts/configuring-dependabot-alerts).
7457

75-
{% data variables.product.github %} may also notify the maintainers of affected repositories about new alerts according to their notification preferences. When {% data variables.product.prodname_dependabot %} is first enabled, {% data variables.product.github %} does not send notifications for all vulnerable dependencies found in your repository, only for new vulnerable dependencies identified after {% data variables.product.prodname_dependabot %} is enabled. For more information, see [AUTOTITLE](/code-security/dependabot/dependabot-alerts/configuring-notifications-for-dependabot-alerts).
58+
## Limitations
7659

77-
{% data reusables.dependabot.dependabot-alert-create-PR %}
60+
{% data variables.product.prodname_dependabot_alerts %} have some limitations:
7861

79-
{% data reusables.dependabot.dependabot-alert-rules %}
62+
* Alerts can't catch every security issue. Always review your dependencies and keep manifest and lock files up to date for accurate detection.
63+
* New vulnerabilities may take time to appear in the {% data variables.product.prodname_advisory_database %} and trigger alerts.
64+
* Only advisories reviewed by {% data variables.product.github %} trigger alerts.
65+
* {% data variables.product.prodname_dependabot %} doesn't scan archived repositories.
66+
* {% data variables.product.prodname_dependabot %} doesn't generate alerts for malware.
67+
* {% data reusables.dependabot.dependabot-alert-actions-semver %}
8068

81-
> [!WARNING]
82-
> {% data variables.product.github %}'s security features do not claim to catch all vulnerabilities. We actively maintain {% data variables.product.prodname_advisory_database %} and generate alerts with the most up-to-date information. However, we cannot catch everything or tell you about known vulnerabilities within a guaranteed time frame. These features are not substitutes for human review of each dependency for potential vulnerabilities or any other issues, and we recommend consulting with a security service or conducting a thorough dependency review when necessary.
83-
84-
## Access to {% data variables.product.prodname_dependabot_alerts %}
85-
86-
You can see all of the alerts that affect a particular project{% ifversion fpt or ghec %} on the repository's **Security** tab or{% endif %} in the repository's dependency graph. For more information, see [AUTOTITLE](/code-security/dependabot/dependabot-alerts/viewing-and-updating-dependabot-alerts).
87-
88-
By default, we notify people with write, maintain, or admin permissions in the affected repositories about new {% data variables.product.prodname_dependabot_alerts %}. {% ifversion fpt or ghec %}{% data variables.product.github %} never publicly discloses insecure dependencies for any repository. You can also make {% data variables.product.prodname_dependabot_alerts %} visible to additional people or teams working with repositories that you own or have admin permissions for. For more information, see [AUTOTITLE](/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-security-and-analysis-settings-for-your-repository#granting-access-to-security-alerts).
89-
{% endif %}
90-
91-
{% data reusables.notifications.vulnerable-dependency-notification-enable %}
92-
{% data reusables.notifications.vulnerable-dependency-notification-delivery-method-customization2 %} For more information, see [AUTOTITLE](/code-security/dependabot/dependabot-alerts/configuring-notifications-for-dependabot-alerts).
93-
94-
You can also see all the {% data variables.product.prodname_dependabot_alerts %} that correspond to a particular advisory in the {% data variables.product.prodname_advisory_database %}. {% data reusables.security-advisory.link-browsing-advisory-db %}
69+
{% ifversion fpt or ghec %}{% data variables.product.github %} never publicly discloses vulnerabilities for any repository. {% endif %}
9570

9671
{% ifversion copilot-chat-ghas-alerts %}
9772

98-
## Asking {% data variables.copilot.copilot_chat %} about {% data variables.product.prodname_dependabot_alerts %}
73+
## Asking {% data variables.copilot.copilot_chat %} about alerts
9974

100-
With a {% data variables.copilot.copilot_enterprise %} license, you can ask {% data variables.copilot.copilot_chat_short %} for help to better understand security alerts, including {% data variables.product.prodname_dependabot_alerts %}, in repositories in your organization. For more information, see [AUTOTITLE](/copilot/using-github-copilot/asking-github-copilot-questions-in-githubcom#asking-questions-about-alerts-from-github-advanced-security-features).
75+
With a {% data variables.copilot.copilot_enterprise %} license, you can ask {% data variables.copilot.copilot_chat_short %} questions about {% data variables.product.prodname_dependabot_alerts %} in your organization's repositories. For more information, see [AUTOTITLE](/copilot/using-github-copilot/asking-github-copilot-questions-in-githubcom#asking-questions-about-alerts-from-github-advanced-security-features).
10176

10277
{% endif %}
10378

10479
## Further reading
10580

106-
* [AUTOTITLE](/code-security/dependabot/dependabot-security-updates/about-dependabot-security-updates)
10781
* [AUTOTITLE](/code-security/dependabot/dependabot-alerts/viewing-and-updating-dependabot-alerts)
82+
* [AUTOTITLE](/code-security/dependabot/dependabot-security-updates/about-dependabot-security-updates)
10883
* [AUTOTITLE](/code-security/getting-started/auditing-security-alerts)
109-
{% ifversion fpt or ghec %}- [AUTOTITLE](/get-started/privacy-on-github){% endif %}

content/code-security/dependabot/dependabot-alerts/configuring-dependabot-alerts.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,10 +43,10 @@ You can enable or disable {% data variables.product.prodname_dependabot_alerts %
4343

4444
You can enable or disable {% data variables.product.prodname_dependabot_alerts %} for all repositories owned by your personal account.
4545

46+
<a href="https://github.com/settings/security_analysis?ref_product=github&ref_type=engagement&ref_style=button" target="_blank" class="btn btn-primary mt-3 mr-3 no-underline"><span>Go to your security settings</span> {% octicon "link-external" height:16 aria-label="link-external" %}</a>
47+
4648
### Enabling or disabling {% data variables.product.prodname_dependabot_alerts %} for existing repositories
4749

48-
{% data reusables.user-settings.access_settings %}
49-
{% data reusables.user-settings.security-analysis %}
5050
1. Under "{% data variables.product.UI_advanced_security %}", to the right of {% data variables.product.prodname_dependabot_alerts %}, click **Disable all** or **Enable all**.
5151
1. Optionally, to enable {% data variables.product.prodname_dependabot_alerts %} by default for new repositories that you create, in the dialog box, select "Enable by default for new repositories".
5252
1. Click **Disable {% data variables.product.prodname_dependabot_alerts %}** or **Enable {% data variables.product.prodname_dependabot_alerts %}** to disable or enable {% data variables.product.prodname_dependabot_alerts %} for all the repositories you own.
@@ -55,8 +55,6 @@ When you enable {% data variables.product.prodname_dependabot_alerts %} for exis
5555

5656
### Enabling or disabling {% data variables.product.prodname_dependabot_alerts %} for new repositories
5757

58-
{% data reusables.user-settings.access_settings %}
59-
{% data reusables.user-settings.security-analysis %}
6058
1. Under "{% data variables.product.UI_advanced_security %}", to the right of {% data variables.product.prodname_dependabot_alerts %}, select **Automatically enable for new repositories**.
6159

6260
{% else %}
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
{% data variables.product.prodname_dependabot %} will only create {% data variables.product.prodname_dependabot_alerts %} for vulnerable {% data variables.product.prodname_actions %} that use semantic versioning. You will not receive alerts for a vulnerable action that uses SHA versioning. If you use {% data variables.product.prodname_actions %} with SHA versioning, we recommend enabling {% data variables.product.prodname_dependabot_version_updates %} for your repository or organization to keep the actions you use updated to the latest versions.
1+
For {% data variables.product.prodname_actions %}, {% data variables.product.prodname_dependabot_alerts %} are only generated for actions that use semantic versioning, not SHA versioning.
Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1 @@
1-
{% data variables.product.prodname_dependabot_alerts %} is available for the following repositories:
2-
3-
* Organization-owned and user-owned repositories
1+
{% data variables.product.prodname_dependabot_alerts %} are available for organization-owned and user-owned repositories.

src/audit-logs/data/fpt/organization.json

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1786,7 +1786,7 @@
17861786
"business_id",
17871787
"actor_is_bot"
17881788
],
1789-
"docs_reference_titles": "/code-security/dependabot/dependabot-alerts/about-dependabot-alerts"
1789+
"docs_reference_titles": "About Dependabot alerts"
17901790
},
17911791
{
17921792
"action": "dependabot_closure_request.cancel",
@@ -1814,7 +1814,7 @@
18141814
"business_id",
18151815
"actor_is_bot"
18161816
],
1817-
"docs_reference_titles": "/code-security/dependabot/dependabot-alerts/about-dependabot-alerts"
1817+
"docs_reference_titles": "About Dependabot alerts"
18181818
},
18191819
{
18201820
"action": "dependabot_closure_request.create",
@@ -1842,7 +1842,7 @@
18421842
"business_id",
18431843
"actor_is_bot"
18441844
],
1845-
"docs_reference_titles": "/code-security/dependabot/dependabot-alerts/about-dependabot-alerts"
1845+
"docs_reference_titles": "About Dependabot alerts"
18461846
},
18471847
{
18481848
"action": "dependabot_closure_request.deny",
@@ -1870,7 +1870,7 @@
18701870
"business_id",
18711871
"actor_is_bot"
18721872
],
1873-
"docs_reference_titles": "/code-security/dependabot/dependabot-alerts/about-dependabot-alerts"
1873+
"docs_reference_titles": "About Dependabot alerts"
18741874
},
18751875
{
18761876
"action": "dependabot_repository_access.default_access_level_updated",
@@ -13288,7 +13288,7 @@
1328813288
"org_id",
1328913289
"request_access_security_header"
1329013290
],
13291-
"docs_reference_titles": "/code-security/security-advisories/working-with-repository-security-advisories/about-repository-security-advisories"
13291+
"docs_reference_titles": "About repository security advisories"
1329213292
},
1329313293
{
1329413294
"action": "repository_advisory.cve_request",
@@ -14745,7 +14745,7 @@
1474514745
"alert_number",
1474614746
"programmatic_access_type"
1474714747
],
14748-
"docs_reference_titles": "/code-security/dependabot/dependabot-alerts/about-dependabot-alerts"
14748+
"docs_reference_titles": "About Dependabot alerts"
1474914749
},
1475014750
{
1475114751
"action": "repository_vulnerability_alert.dismiss",

src/audit-logs/data/fpt/user.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1322,7 +1322,7 @@
13221322
"business_id",
13231323
"actor_is_bot"
13241324
],
1325-
"docs_reference_titles": "/code-security/dependabot/dependabot-alerts/about-dependabot-alerts"
1325+
"docs_reference_titles": "About Dependabot alerts"
13261326
},
13271327
{
13281328
"action": "dependabot_closure_request.cancel",
@@ -1350,7 +1350,7 @@
13501350
"business_id",
13511351
"actor_is_bot"
13521352
],
1353-
"docs_reference_titles": "/code-security/dependabot/dependabot-alerts/about-dependabot-alerts"
1353+
"docs_reference_titles": "About Dependabot alerts"
13541354
},
13551355
{
13561356
"action": "dependabot_closure_request.create",
@@ -1378,7 +1378,7 @@
13781378
"business_id",
13791379
"actor_is_bot"
13801380
],
1381-
"docs_reference_titles": "/code-security/dependabot/dependabot-alerts/about-dependabot-alerts"
1381+
"docs_reference_titles": "About Dependabot alerts"
13821382
},
13831383
{
13841384
"action": "dependabot_closure_request.deny",
@@ -1406,7 +1406,7 @@
14061406
"business_id",
14071407
"actor_is_bot"
14081408
],
1409-
"docs_reference_titles": "/code-security/dependabot/dependabot-alerts/about-dependabot-alerts"
1409+
"docs_reference_titles": "About Dependabot alerts"
14101410
},
14111411
{
14121412
"action": "dependabot_repository_access.repositories_updated",

0 commit comments

Comments
 (0)