About GitHub's security features
GitHub has security features that help keep code and secrets secure in repositories and across organizations. Some features are available for all repositories. Additional features are available to enterprises that use GitHub Advanced Security. Para obtener más información, consulta la sección "Acerca de GitHub Advanced Security".
The GitHub Advisory Database contains a curated list of security vulnerabilities that you can view, search, and filter. Para obtener más información sobre los datos de las asesorías, consulta la sección "Buscar vulnerabilidades de seguridad en la GitHub Advisory Database" dentro de la documentación de GitHub.com.
Available for all repositories
Las alertas del dependabot
View alerts about dependencies that are known to contain security vulnerabilities, and manage these alerts. For more information, see "About alerts for vulnerable dependencies."
Dependency graph
The dependency graph allows you to explore the ecosystems and packages that your repository depends on and the repositories and packages that depend on your repository.
You can find the dependency graph on the Insights tab for your repository. For more information, see "About the dependency graph."
Available with GitHub Advanced Security
GitHub Advanced Security features are available for enterprises with a license for GitHub Advanced Security. The features are restricted to repositories owned by an organization. Para obtener más información, consulta la sección "Acerca de GitHub Advanced Security".
Escaneo de código
Automatically detect security vulnerabilities and coding errors in new or modified code. Potential problems are highlighted, with detailed information, allowing you to fix the code before it's merged into your default branch. For more information, see "About code scanning."
Escaneo de secretos
Automatically detect tokens or credentials that have been checked into a repository. You can view any secrets that GitHub has found in your code. You should treat tokens or credentials that have been checked into the repository as compromised. For more information, see "About secret scanning."