Preventing users from changing anonymous Git read access
You can prevent repository administrators from changing anonymous Git read access to a repository.
Note: If you enable anonymous Git read access, you're responsible for all access and use of this feature. GitHub will not be responsible for any unintended access or misuse of the feature. Also, you may not use this feature to violate your license from GitHub, including the limit on the number of seats you've ordered from us.
To prevent repository administrators from changing the anonymous Git read access settings for a specific repository, you can lock the repository's access settings. After you lock a repository's Git read access setting, only a site administrator can change the setting.
A repository administrator can change the anonymous Git read access for a public repository if it's not a fork. For more information, see "Allowing admins to enable anonymous Git read access to public repositories."
To see the repositories with anonymous Git read access enabled, filter the repositories list in the site admin dashboard.
Preventing users from changing anonymous Git read access for a repository
-
In the upper-right corner of any page, click .
-
In the search field, type the name of the repository and click Search.
-
In the search results, click the name of the repository.
-
In the upper-right corner of the page, click Admin.
-
In the left sidebar, click Admin.
-
Under "Danger Zone", select Prevent repository admins from enabling anonymous Git read access.