Skip to main content
GitHub Docs
Version:
Enterprise Server 3.19
Search or ask Copilot
Search or ask
Copilot
Select language: current language is English
Search or ask Copilot
Search or ask
Copilot
Open menu
Open Sidebar
Security and code quality
/
Supply chain security
Home
Security and code quality
Getting started
GitHub security features
Secure repository quickstart
Secure your organization
Exposure to leaked secrets
Secret protection pricing
Secret scanning
Troubleshoot
Troubleshoot secret scanning
CodeQL for VS Code
Troubleshooting CodeQL for VS Code
Access logs
Supply chain security
Understand your supply chain
Enforce dependency review
Troubleshoot dependency graph
Dependabot
Work with Dependabot
Configure VNET
Troubleshoot Dependabot
Troubleshoot Dependabot on Actions
Security overview
Review alert dismissal requests
Concepts
Secret security
Secret scanning
Push protection
Secret protection tools
Secret scanning alerts
Delegated bypass
Push protection from the REST API
Code scanning
Introduction
Code scanning alerts
Evaluate code scanning
Integration with code scanning
CodeQL
CodeQL code scanning
CodeQL query suites
CodeQL CLI
CodeQL for VS Code
CodeQL workspaces
Query reference files
Supply chain security
Supply chain features
Dependency best practices
Dependency graph
Dependency review
Dependabot alerts
Dependabot security updates
Dependabot version updates
Dependabot auto-triage rules
Vulnerability reporting
GitHub Advisory database
Global security advisories
Vulnerability exposure
Security at scale
Organization security
Security configurations
Security overview
Audit security alerts
Supply chain security
How-tos
Secure at scale
Configure enterprise security
Establish complete coverage
Enable GitHub Advanced Security
Create custom configuration
Apply custom configuration
Configure additional settings
Manage your coverage
Edit custom configuration
Delete custom configuration
Configure specific tools
Enable dependency graph
Configure code scanning
Configure dependency review
Configure secret scanning
View vulnerability data
Limited internet access
Configure organization security
Establish complete coverage
Create custom configuration
Apply custom configuration
Configure global settings
Manage your coverage
Edit custom configuration
Filter repositories
Detach security configuration
Delete custom configuration
Configure specific tools
Assess your secret risk
View risk report
Push protection cost savings
Protect your secrets
Code scanning at scale
CodeQL advanced setup at scale
Manage usage and access
Give access to private registries
Manage paid GHAS use
Troubleshoot security configurations
Active advanced setup
Feature disappears
Unexpected default setup
Find attachment failures
Not enough GHAS licenses
Secure secrets
Leak detection
Enable secret scanning
Enable for non-provider patterns
Detection customization
Define custom patterns
Manage custom patterns
Exclude folders and files
Leak prevention
Enable push protection
Push protection
Push protection on the command line
Push protection in the GitHub UI
Bypass requests
Enable delegated bypass
Manage bypass requests
Review bypass requests
Scan code for vulnerabilities
Configure code scanning
Configure code scanning
Configure advanced setup
Customize advanced setup
Manage your configuration
Code scanning tool status
Edit default setup
Set merge protection
CodeQL for compiled languages
Scan from the command line
Set up the CodeQL CLI
Advanced setup of the CodeQL CLI
Use custom queries with the CodeQL CLI
Test query help files
Specify command options in a CodeQL configuration file
Createting CodeQL CLI database bundles
Scan from VS Code
Extension installation
Manage CodeQL databases
Run CodeQL queries
Explore data flow
Use the model editor
Custom query creation
Manage CodeQL packs
Explore code structure
Test CodeQL queries
Customize settings
CodeQL workspace setup
CodeQL CLI access
Integrate with existing tools
Use with existing CI system
Upload a SARIF file
Troubleshoot
Troubleshoot analysis errors
Alerts in generated code
Automatic build failed
C# compiler failing
Cannot enable CodeQL in a private repository
Analysis takes too long
Fewer lines scanned than expected
Enabling default setup takes too long
Code Security must be enabled
Out of disk or memory
Not recognized
No source code seen during build
Extraction errors in the database
Logs not detailed enough
Results different than expected
Some languages not analyzed
Two CodeQL workflows
Unclear what triggered a workflow
Unnecessary step found
Kotlin detected in no build
Troubleshoot SARIF uploads
GitHub token missing
SARIF file invalid
Results exceed limits
Results file too large
GitHub Code Security disabled
Default setup is enabled
Secure your supply chain
Secure your dependencies
Configure Dependabot alerts
Configure security updates
Configure version updates
Auto-update actions
Configure dependency graph
Explore dependencies
Use dependency submission API
Manage your dependency security
Auto-triage Dependabot alerts
Prioritize with preset rules
Customize Dependabot PRs
Control dependency update
Configure dependency review action
Optimize Java packages
Configure Dependabot notifications
Configure access to private registries
Remove access to public registries
Manage Dependabot PRs
List configured dependencies
Configure private registries
Troubleshoot dependency security
Troubleshoot Dependabot errors
Troubleshoot vulnerability detection
Dependabot stopped working
Establish provenance and integrity
Export dependencies as SBOM
Manage security alerts
Remediate at scale
Filter security alerts
Secret scanning alerts
Monitor alerts
View alerts
Resolve alerts
Delegated alert dismissal
Code scanning alerts
Assess alerts
Triage alerts in pull requests
Resolve alerts
Enable delegated alert dismissal
Dependabot alerts
View Dependabot alerts
Manage auto-dismissed alerts
Report and fix vulnerabilities
Configure vulnerability reporting
Add a security policy
Fix vulnerabilities
Browse Advisory Database
Edit Advisory Database
View and interpret data
Analyze organization data
Assess security risk of code
Assess adoption of features
View security insights
Interpret security data
View PR alert metrics
View secret scanning metrics
View Dependabot metrics
Export risk report CSV
View code scanning logs
View Dependabot logs
Custom pattern metrics
Reference
Secret security
GitHub secret types
Supported patterns
Risk report CSV contents
Code scanning
SARIF support
CodeQL
Hardware resources for CodeQL
Telemetry
CodeQL queries
About built-in queries
Actions queries
C and C++ queries
C# queries
Go queries
Java and Kotlin queries
JavaScript and TypeScript queries
Python queries
Ruby queries
Rust queries
Swift queries
CodeQL CLI
CodeQL CLI SARIF output
CodeQL CLI CSV output
Extractor options
Exit codes
CodeQL CLI manual
bqrs decode
bqrs diff
bqrs hash
bqrs info
bqrs interpret
database add-diagnostic
database analyze
database bundle
database cleanup
database create
database export-diagnostics
database finalize
database import
database index-files
database init
database interpret-results
database print-baseline
database run-queries
database trace-command
database unbundle
database upgrade
dataset check
dataset cleanup
dataset import
dataset measure
dataset upgrade
diagnostic add
diagnostic export
execute cli-server
execute language-server
execute queries
execute query-server
execute query-server2
execute upgrades
generate extensible-predicate-metadata
generate log-summary
generate overlay-changes
generate query-help
github merge-results
github upload-results
pack add
pack bundle
pack ci
pack create
pack download
pack init
pack install
pack ls
pack packlist
pack publish
pack resolve-dependencies
pack upgrade
query compile
query decompile
query format
query run
resolve database
resolve extensions
resolve extensions-by-pack
resolve extractor
resolve files
resolve languages
resolve library-path
resolve metadata
resolve ml-models
resolve packs
resolve qlpacks
resolve qlref
resolve queries
resolve ram
resolve tests
resolve upgrades
test accept
test extract
test run
version
Supply chain security
Dependabot options
Dependabot ecosystems
Dependency graph ecosystems
Tutorials
Trial GitHub Advanced Security
Plan GHAS trial
Trial Advanced Security
Enable security features in trial
Trial Secret Protection
Trial Code Security
Adopt GHAS at scale
Introduction
1. Align on strategy
2. Preparation
3. Pilot programs
4. Create internal documentation
5. Rollout code scanning
6. Rollout secret scanning
Secure your organization
Prevent data leaks
Interpret secret risk assessment
Remediate leaked secrets
Evaluate alerts
Remediate a leaked secret
Customize code scanning
Preparing code for analysis
Analyzing code
Uploading results to GitHub
Code scanning in a container
Customizing analysis
Creating CodeQL query suites
Testing custom queries
Creating and working with CodeQL packs
Publishing and using CodeQL packs
Secure your dependencies
Dependabot quickstart
Use Dependabot with Actions
Optimize PR creation
Configure ARC
Configure multi-ecosystem updates
Customize Dependabot PRs
Customize dependency review action
Implement supply chain best practices
Overview
Securing accounts
Securing code
Securing builds
Manage security alerts
Prioritize Dependabot alerts using metrics
Security and code quality
/
Supply chain security
Securing your software supply chain
Visualize, maintain, and secure the dependencies in your software supply chain.
Understanding your software supply chain
Enforcing dependency review across an organization
Troubleshooting the dependency graph