Skip to main content
ドキュメントには頻繁に更新が加えられ、その都度公開されています。本ページの翻訳はまだ未完成な部分があることをご了承ください。最新の情報については、英語のドキュメンテーションをご参照ください。本ページの翻訳に問題がある場合はこちらまでご連絡ください。

About supply chain security

GitHub Enterprise Cloud helps you secure your supply chain, from understanding the dependencies in your environment, to knowing about vulnerabilities in those dependencies, and patching them.

About supply chain security at GitHub

With the accelerated use of open source, most projects depend on hundreds of open-source dependencies. This poses a security problem: what if the dependencies you're using are vulnerable? You could be putting your users at risk of a supply chain attack. One of the most important things you can do to protect your supply chain is to patch your vulnerabilities.

You add dependencies directly to your supply chain when you specify them in a manifest file or a lockfile. Dependencies can also be included transitively, that is, even if you don’t specify a particular dependency, but a dependency of yours uses it, then you’re also dependent on that dependency.

GitHub Enterprise Cloud offers a range of features to help you understand the dependencies in your environment, know about vulnerabilities in those dependencies, and patch them.

The supply chain features on GitHub Enterprise Cloud are:

  • Dependency graph
  • Dependency review
  • Dependabotアラート
  • Dependabot updates
    • Dependabotセキュリティアップデート
    • Dependabotバージョンアップデート

The dependency graph is central to supply chain security. The dependency graph identifies all upstream dependencies and public downstream dependents of a repository or package. You can see your repository’s dependencies and some of their properties, like vulnerability information, on the dependency graph for the repository.

Other supply chain features on GitHub rely on the information provided by the dependency graph.

  • Dependency review uses the dependency graph to identify dependency changes and help you understand the security impact of these changes when you review pull requests.
  • Dependabot cross-references dependency data provided by the dependency graph with the list of known vulnerabilities published in the GitHub Advisory Database, scans your dependencies and generates Dependabotアラート when a potential vulnerability is detected.
  • Dependabotセキュリティアップデート use the dependency graph and Dependabotアラート to help you update dependencies with known vulnerabilities in your repository.

Dependabotバージョンアップデート don't use the dependency graph and rely on the semantic versioning of dependencies instead. Dependabotバージョンアップデート help you keep your dependencies updated, even when they don’t have any vulnerabilities.

Feature overview

What is the dependency graph

To generate the dependency graph, GitHub looks at a repository’s explicit dependencies declared in the manifest and lockfiles. When enabled, the dependency graph automatically parses all known package manifest files in the repository, and uses this to construct a graph with known dependency names and versions.

  • The dependency graph includes information on your direct dependencies and transitive dependencies.
  • The dependency graph is automatically updated when you push a commit to GitHub that changes or adds a supported manifest or lock file to the default branch, and when anyone pushes a change to the repository of one of your dependencies.
  • You can see the dependency graph by opening the repository's main page on GitHub Enterprise Cloud, and navigating to the Insights tab.

For more information about the dependency graph, see "About the dependency graph."

What is dependency review

Dependency review helps reviewers and contributors understand dependency changes and their security impact in every pull request.

  • Dependency review tells you which dependencies were added, removed, or updated, in a pull request. You can use the release dates, popularity of dependencies, and vulnerability information to help you decide whether to accept the change.
  • You can see the dependency review for a pull request by showing the rich diff on the Files Changed tab.

For more information about dependency review, see "About dependency review."

What is Dependabot

Dependabot keeps your dependencies up to date by informing you of any security vulnerabilities in your dependencies, and automatically opens pull requests to upgrade your dependencies to the next available secure version when a Dependabot alert is triggered, or to the latest version when a release is published.

The term "Dependabot" encompasses the following features:

  • Dependabotアラート—Displayed notification on the Security tab for the repository, and in the repository's dependency graph. The alert includes a link to the affected file in the project, and information about a fixed version.
  • Dependabot updates:
    • Dependabotセキュリティアップデート—Triggered updates to upgrade your dependencies to a secure version when an alert is triggered.
    • Dependabotバージョンアップデート—Scheduled updates to keep your dependencies up to date with the latest version.

What are Dependabot alerts

Dependabotアラート highlight repositories affected by a newly discovered vulnerability based on the dependency graph and the GitHub Advisory Database, which contains the versions on known vulnerability lists.

  • Dependabot performs a scan to detect vulnerable dependencies and sends Dependabotアラート when:

    • A new vulnerability is added to the GitHub Advisory Database.
    • The dependency graph for the repository changes.
  • Dependabotアラート are displayed on the Security tab for the repository and in the repository's dependency graph. The alert includes a link to the affected file in the project, and information about a fixed version.

For more information about Dependabotアラート, see "About alerts for vulnerable dependencies."

What are Dependabot updates

There are two types of Dependabot updates: Dependabot security updates and version updates. Dependabot generates automatic pull requests to update your dependencies in both cases, but there are several differences.

Dependabotセキュリティアップデート:

  • Triggered by a Dependabot alert
  • Update dependencies to the minimum version that resolves a known vulnerability
  • Supported for ecosystems the dependency graph supports

Dependabotバージョンアップデート:

  • Run on a schedule you configure
  • Update dependencies to the latest version that matches the configuration
  • Supported for a different group of ecosystems

For more information about Dependabot updates, see "About Dependabotセキュリティアップデート" and "About Dependabotバージョンアップデート."

Feature availability

Public repositories:

  • Dependency graph—enabled by default and cannot be disabled.
  • Dependency review—enabled by default and cannot be disabled.
  • Dependabotアラート—not enabled by default. GitHub detects vulnerable dependencies and displays information in the dependency graph, but does not generate Dependabotアラート by default. Repository owners or people with admin access can enable Dependabotアラート. You can also enable or disable Dependabot alerts for all repositories owned by your user account or organization. For more information, see "Managing security and analysis settings for your user account" or "Managing security and analysis settings for your organization."

Private repositories:

Any repository type:

  • Dependabotセキュリティアップデート—not enabled by default. You can enable Dependabotセキュリティアップデート for any repository that uses Dependabotアラート and the dependency graph. For information about enabling security updates, see "Configuring Dependabotセキュリティアップデート."
  • Dependabotバージョンアップデート—not enabled by default. People with write permissions to a repository can enable Dependabotバージョンアップデート. For information about enabling version updates, see "Configuring Dependabotバージョンアップデート."