Skip to main content

Personnalisation des règles de triage automatique pour classer les alertes Dependabot par ordre de priorité

Vous pouvez créer vos propres Règles de triage automatique pour contrôler les alertes qui sont ignorées ou temporairement désactivées, et les alertes pour lesquelles vous souhaitez que Dependabot ouvre des demandes de tirage.

Qui peut utiliser cette fonctionnalité ?

People with write permissions can view Règles de triage automatique de Dependabot for the repository. People with admin permissions to a repository can enable or disable Règles de triage automatique for the repository, as well as create Règles de triage automatique personnalisées. Additionally, organization owners and security managers can set Règles de triage automatique at the organization-level and optionally choose to enforce rules for repositories in the organization.

Règles de triage automatique personnalisées pour Dependabot alerts sont disponibles pour les référentiels appartenant à l’organisation dans GitHub Enterprise Server. Cette fonctionnalité nécessite une licence pour GitHub Advanced Security.

About custom auto-triage rules

You can create your own Dependabot auto-triage rules based on alert metadata. You can choose to auto-dismiss alerts indefinitely, or snooze alerts until a patch becomes available, and you can specify which alerts you want Dependabot to open pull requests for.

Since any rules that you create apply to both future and current alerts, you can also use auto-triage rules to manage your Dependabot alerts in bulk.

Repository administrators can create custom auto-triage rules for their public, private, and internal repositories.

Organization owners and security managers can set custom auto-triage rules at the organization-level, and then choose if a rule is enforced or enabled across all public repositories in the organization.

  • Enforced: If an organization-level rule is "enforced", repository administrators cannot edit, disable, or delete the rule.
  • Enabled: If an organization-level rule is "enabled", repository administrators can still disable the rule for their repository.

Note: In the event that an organization-level rule and a repository-level rule specify conflicting behaviors, the action set out by the organization-level rule takes precedence. Dismissal rules always act before rules which trigger Dependabot pull requests.

You can create rules to target alerts using the following metadata:

  • CVE ID
  • CWE
  • Dependency scope (devDependency or runtime)
  • Ecosystem
  • GHSA ID
  • Manifest path (for repository-level rules only)
  • Package name
  • Patch availability
  • Severity

Understanding how custom auto-triage rules and Dependabot security updates interact

You can use custom auto-triage rules to tailor which alerts you want Dependabot to open pull requests for. However, for an "open a pull request" rule to take effect, you must ensure that Dependabot security updates are disabled for the repository (or repositories) that the rule should apply to.

When Dependabot security updates are enabled for a repository, Dependabot will automatically try to open pull requests to resolve every open Dependabot alert that has an available patch. If you prefer to customize this behavior using a rule, you must leave Dependabot security updates disabled.

For more information about enabling or disabling Dependabot security updates for a repository, see "Configuring Dependabot security updates."

Adding custom auto-triage rules to your repository

Note: During the beta, you can create up to 10 custom auto-triage rules for a repository.

  1. On GitHub, navigate to the main page of the repository.

  2. Under your repository name, click Settings. If you cannot see the "Settings" tab, select the dropdown menu, then click Settings.

    Screenshot of a repository header showing the tabs. The "Settings" tab is highlighted by a dark orange outline.

  3. In the "Security" section of the sidebar, click Code security and analysis.

  4. Under "Dependabot alerts", click close to "Dependabot rules".

  5. Click New rule.

  6. Under "Rule name", describe what this rule will do.

  7. Under "State", use the dropdown menu to select whether the rule should be enabled or disabled for the repository.

  8. Under "Target alerts", select the metadata you want to use to filter alerts.

  9. Under "Rules", select the action you want to take on alerts that match the metadata:

    • Select Dismiss alerts to auto-dismiss alerts that match the metadata. You can choose to dismiss alerts indefinitely or until a patch is available.
    • Select Open a pull request to resolve this alert if you want Dependabot to suggest changes to resolve alerts that match the targeted metadata. Note that this option is unavailable if you have already selected the option to dismiss alerts indefinitely, or if Dependabot security updates are enabled in your repository settings.
  10. Click Create rule.

Adding custom auto-triage rules to your organization

Note: During the beta, you can create up to 25 custom auto-triage rules for your organization.

  1. In the upper-right corner of GitHub, select your profile photo, then click Your organizations.
  2. Next to the organization, click Settings.
  3. In the "Security" section of the sidebar, click Code security and analysis.
  4. Under "Dependabot", then under "Dependabot alerts", click close to "Dependabot rules".
  5. Click New rule.
  6. Under "Rule name", describe what this rule will do.
  7. Under "State", use the dropdown menu to choose how you want to apply the rule.
    • Choose Enforced to prevent repository administrators from being able to edit, disable, or delete the rule in the repository's settings page.
    • Choose Enabled to set the rule on-by-default for all repositories, while also allowing repository administrators to disable the rule in the repository's settings page.
    • Alternatively, you can choose to set the rule as Disabled, which cannot be overridden at the repository level. Disabled rules are hidden for all repositories.
  8. Under "Target alerts", select the metadata you want to use to filter alerts.
  9. Under "Rules", select the action you want to take on alerts that match the metadata:
    • Select Dismiss alerts to auto-dismiss alerts that match the metadata. You can choose to dismiss alerts indefinitely, or until a patch is available.
    • Select Open a pull request to resolve this alert if you want Dependabot to suggest changes to resolve alerts that match the metadata. Note that this option is unavailable if you have selected the option to dismiss the alerts indefinitely.
  10. Click Create rule.

Editing or deleting custom auto-triage rules for your repository

  1. On GitHub, navigate to the main page of the repository.

  2. Under your repository name, click Settings. If you cannot see the "Settings" tab, select the dropdown menu, then click Settings.

    Screenshot of a repository header showing the tabs. The "Settings" tab is highlighted by a dark orange outline.

  3. In the "Security" section of the sidebar, click Code security and analysis.

  4. Under "Dependabot alerts", click close to "Dependabot rules".

  5. Under "Repository rules", to the right of the rule that you want to edit or delete, click .

  6. To edit the rule, make any changes to the applicable fields, then click Save rule.

  7. To delete the rule, under "Danger Zone", click Delete rule.

  8. In the "Are you sure you want to delete this rule?" dialog box, review the information, then click Delete rule.

Editing or deleting custom auto-triage rules for your organization

  1. In the upper-right corner of GitHub, select your profile photo, then click Your organizations.
  2. Next to the organization, click Settings.
  3. In the "Security" section of the sidebar, click Code security and analysis.
  4. Under "Dependabot", then under "Dependabot alerts", click close to "Dependabot rules".
  5. Under "Organization rules", to the right of the rule that you want to edit or delete, click .
  6. To edit the rule, make any changes to the applicable fields, then click Save rule.
  7. To delete the rule, under "Danger Zone", click Delete rule.
  8. In the "Are you sure you want to delete this rule?" dialog box, review the information, then click Delete rule.