Skip to main content
Nous publions des mises à jour fréquentes de notre documentation, et la traduction de cette page peut encore être en cours. Pour obtenir les informations les plus actuelles, consultez la documentation anglaise.

Filtering alerts in security overview

Use filters to view specific categories of alerts

Qui peut utiliser cette fonctionnalité

Les propriétaires d’organisation et les gestionnaires de sécurité peuvent accéder à la vue d’ensemble de la sécurité au niveau de l’organisation et afficher les alertes de plusieurs organisations via la vue d’ensemble de la sécurité au niveau de l’entreprise. Les propriétaires d’entreprise peuvent uniquement afficher les référentiels et les alertes pour les organisations où ils sont ajoutés en tant que propriétaire d’organisation ou gestionnaire de sécurité. Les membres de l’organisation peuvent accéder à la vue d’ensemble de la sécurité au niveau de l’organisation pour afficher les résultats des référentiels où ils disposent de privilèges d’administrateur ou d’un accès aux alertes de sécurité.

Toutes les organisations et entreprises ont une vue d’ensemble de la sécurité. Si vous utilisez des fonctionnalités GitHub Advanced Security qui sont gratuites pour les référentiels publics, vous verrez des informations supplémentaires. Pour plus d’informations, consultez « À propos de GitHub Advanced Security ».

About filtering security overview

You can use filters in a security overview to narrow your focus based on a range of factors, like alert risk level, alert type, and feature enablement. Different filters are available depending on the specific view and whether you are viewing data at the enterprise or organization level.

Les informations indiquées dans la vue d’ensemble de la sécurité varient en fonction de votre accès aux dépôts et de l’utilisation de GitHub Advanced Security par ces référentiels.

Filter by repository

QualifierDescription
repo:REPOSITORY-NAMEDisplays data for the specified repository.

Filter by whether security features are enabled

In the examples below, replace :enabled with :not-enabled to see repositories where security features are not enabled. These qualifiers are available in the main summary views.

QualifierDescription
code-scanning:enabledDisplay repositories that have configured code scanning.
dependabot:enabledDisplay repositories that have enabled Dependabot alerts.
secret-scanning:enabledDisplay repositories that have enabled Alertes d’analyse de secrets.
any-feature:enabledDisplay repositories where at least one security feature is enabled.

The organization-level "Security coverage" view includes extra filters.

Remarque : Les vues « Risque de sécurité » et « Couverture de sécurité » sont actuellement en version bêta et sont susceptibles d’être modifiées.

QualifierDescription
advanced-security:enabledDisplay repositories that have enabled GitHub Advanced Security.
code-scanning-pull-request-alerts:enabledDisplay repositories that have configured code scanning to run on pull requests.
dependabot-security-updates:enabledDisplay repositories that have enabled Dependabot security updates.
secret-scanning-push-protection:enabledDisplay repositories that have enabled push protection for secret scanning.

Filter by repository type

These qualifiers are available in the main summary views.

QualifierDescription
is:publicDisplay public repositories.
is:internalDisplay internal repositories.
is:privateDisplay private repositories.
archived:trueDisplay archived repositories.
archived:falseOmit archived repositories.

Filter by level of risk for repositories

The level of risk for a repository is determined by the number and severity of alerts from security features. If one or more security features are not enabled for a repository, the repository will have an unknown level of risk. If a repository has no risks that are detected by security features, the repository will have a clear level of risk.

These qualifiers are available in the enterprise-level view.

QualifierDescription
risk:highDisplay repositories that are at high risk.
risk:mediumDisplay repositories that are at medium risk.
risk:lowDisplay repositories that are at low risk.
risk:unknownDisplay repositories that are at an unknown level of risk.
risk:clearDisplay repositories that have no detected level of risk.

Filter by number of alerts

These qualifiers are available in the enterprise-level "Overview" and in the organization-level "Security risk" view.

QualifierDescription
code-scanning:NUMBERDisplay repositories that have NUMBER code scanning alerts. This qualifier can use =, > and < comparison operators.
secret-scanning:NUMBERDisplay repositories that have NUMBER Alertes d’analyse de secrets. This qualifier can use =, > and < comparison operators.
dependabot:NUMBERDisplay repositories that have NUMBER Dependabot alerts. This qualifier can use =, > and < comparison operators.

Filter by team

These qualifiers are available in the main summary views.

QualifierDescription
team:TEAM-NAMEDisplays repositories that TEAM-NAME has write access or admin access to.

Filter by topic

These qualifiers are available in the main summary views.

QualifierDescription
topic:TOPIC-NAMEDisplays repositories that are classified with TOPIC-NAME.

Additional filters for code scanning alert views

All code scanning alerts have one of the categories shown below. You can click any result to see full details of the relevant query and the line of code that triggered the alert.

QualifierDescription
severity:criticalDisplays code scanning alerts categorized as critical.
severity:highDisplays code scanning alerts categorized as high.
severity:mediumDisplays code scanning alerts categorized as medium.
severity:lowDisplays code scanning alerts categorized as low.
severity:errorDisplays code scanning alerts categorized as errors.
severity:warningDisplays code scanning alerts categorized as warnings.
severity:noteDisplays code scanning alerts categorized as notes.

Additional filters for Dependabot alert views

You can filter the view to show Dependabot alerts that are ready to fix or where additional information about exposure is available. You can click any result to see full details of the alert.

QualifierDescription
has:patchDisplays Dependabot alerts for vulnerabilities where a secure version is already available.
has:vulnerable-callsDisplays Dependabot alerts where at least one call from the repository to a vulnerable function is detected. For more information, see "Affichage et mise à jour des alertes Dependabot."

Additional filters for secret scanning alert views

QualifierDescription
provider:PROVIDER_NAMEDisplays alerts for all secrets issues by the specified provider.
secret-type:SERVICE_PROVIDERDisplays alerts for the specified secret and provider.
secret-type:CUSTOM-PATTERNDisplays alerts for secrets matching the specified custom pattern.

For more information, see "Modèles d’analyse des secrets."