Frecuentemente publicamos actualizaciones de nuestra documentación. Es posible que la traducción de esta página esté en curso. Para conocer la información más actual, visita la documentación en inglés. Si existe un problema con las traducciones en esta página, por favor infórmanos.

About managing vulnerable dependencies

GitHub helps you to avoid using third-party software that contains known vulnerabilities.

GitHub provides the following tools for removing and avoiding vulnerable dependencies.

Dependency graph

The dependency graph is a summary of the manifest and lock files stored in a repository. It shows you the ecosystems and packages your codebase depends on (its dependencies) and the repositories and packages that depend on your project (its dependents). The information in the dependency graph is used by dependency review and Dependabot de GitHub. For more information, see "About the dependency graph."

Dependency review

By checking the dependency reviews on pull requests you can avoid introducing vulnerabilities from dependencies into your codebase. If the pull requests adds a vulnerable dependency, or changes a dependency to a vulnerable version, this is highlighted in the dependency review. You can change the dependency to a patched version before merging the pull request. For more information, see "About dependency review."

Alertas del Dependabot de GitHub

GitHub can create Alertas del Dependabot de GitHub when it detects vulnerable dependencies in your repository. The alert is displayed on the Security tab for the repository. The alert includes a link to the affected file in the project, and information about a fixed version. GitHub also notifies the maintainers of the repository, according to their notification preferences. For more information, see "About alerts for vulnerable dependencies."

Actualizaciones de seguridad del Dependabot de GitHub

When GitHub generates a Dependabot de GitHub alert for a vulnerable dependency in your repository, Dependabot de GitHub can automatically try to fix it for you. Actualizaciones de seguridad del Dependabot de GitHub are automatically generated pull requests that update a vulnerable dependency to a fixed version. For more information, see "About Actualizaciones de seguridad del Dependabot de GitHub."

Actualizaciones de versión para el Dependabot de GitHub

Enabling Actualizaciones de versión para el Dependabot de GitHub takes the effort out of maintaining your dependencies. With Actualizaciones de versión para el Dependabot de GitHub, whenever GitHub identifies an outdated dependency, it raises a pull request to update the manifest to the latest version of the dependency. By contrast, Actualizaciones de seguridad del Dependabot de GitHub only raises pull requests to fix vulnerable dependencies. For more information, see "About Dependabot version updates."

¿Te ayudó este documento?

Privacy policy

Help us make these docs great!

All GitHub docs are open source. See something that's wrong or unclear? Submit a pull request.

Make a contribution

O, learn how to contribute.