Skip to main content

解读存储库的安全发现

可以分析组织中关于存储库的安全数据,确定是否需要对安全设置进行更改。

谁可以使用此功能?

组织所有者和安全经理可以管理组织的 security configurations 和 global settings。

Note: Security configurations and global settings are in beta and subject to change. To provide feedback on these features, see the feedback discussion.

About security findings on a repository

After you apply a security configuration to a repository, the enabled security features will likely raise security findings on that repository. These findings may show up as feature-specific alerts, or as automatically generated pull requests designed to keep your repository secure. To best secure your organization, you should be able to understand and resolve these alerts and pull requests, then analyze the findings and make any necessary adjustments to your security configuration.

Finding repositories with security alerts using security overview

The information shown by security overview varies according to your access to repositories and organizations, and according to whether GitHub Advanced Security is used by those repositories and organizations. For more information, see "About security overview."

  1. On GitHub.com, navigate to the main page of the organization.

  2. Under your organization name, click Security.

    Screenshot of the horizontal navigation bar for an organization. A tab, labeled with a shield icon and "Security," is outlined in dark orange.

  3. To display the "Security risk" view, in the sidebar, click Risk.

  4. Use options in the page summary to filter results to show the repositories you want to assess. The list of repositories and metrics displayed on the page automatically update to match your current selection. For more information on filtering, see "Filtering alerts in security overview."

    • Use the Teams dropdown to show information only for the repositories owned by one or more teams.
    • Click NUMBER affected or NUMBER unaffected in the header for any feature to show only the repositories with open alerts or no open alerts of that type.
    • Click any of the descriptions of "Open alerts" in the header to show only repositories with alerts of that type and category. For example, 1 critical to show the repository with a critical alert for Dependabot.
    • At the top of the list of repositories, click NUMBER Archived to show only repositories that are archived.
    • Click in the search box to add further filters to the repositories displayed.
  5. Optionally, use the sidebar on the left to explore alerts for a specific security feature in greater detail. On each page, you can use filters that are specific to that feature to refine your search. For more information about the available qualifiers, see "Filtering alerts in security overview."

Interpreting secret scanning alerts

Secret scanning is a security tool that scans the entire Git history of your repository, as well as issues, pull requests, and discussions in that repository, for leaked secrets that have been accidentally committed, such as tokens or private keys. There are two types of secret scanning alerts:

  • Secret scanning alerts for partners, which are sent to the provider who issued the secret
  • Secret scanning alerts for users, which appear on GitHub Enterprise Cloud and can be resolved

You can view secret scanning alerts for a repository by navigating to the main page of that repository, clicking the Security tab, then clicking Secret scanning.

For an introduction to secret scanning alerts, see "About secret scanning."

To learn how to interpret and resolve secret scanning alerts, see "Managing alerts from secret scanning."

Interpreting code scanning alerts

Code scanning is a feature that you use to analyze the code in a GitHub repository to find security vulnerabilities and coding errors. Any problems identified by the analysis are shown in your repository. These problems are raised as code scanning alerts, which contain detailed information on the vulnerability or error detected.

You can view the code scanning alerts for a repository by navigating to the main page of that repository, clicking the Security tab, then clicking Code scanning.

For an introduction to code scanning alerts, see "About code scanning alerts."

To learn how to interpret and resolve code scanning alerts, see "Managing code scanning alerts for your repository."

Interpreting Dependabot alerts

Dependabot alerts inform you about vulnerabilities in the dependencies that you use in your repository. You can view Dependabot alerts for a repository by navigating to the main page of that repository, clicking the Security tab, then clicking Dependabot.

For an introduction to Dependabot alerts, see "About Dependabot alerts."

To learn how to interpret and resolve Dependabot alerts, see "Viewing and updating Dependabot alerts."

Note: If you enabled Dependabot security updates or Dependabot version updates, Dependabot can also automatically raise pull requests to update the dependencies used in your repository. For more information, see "About Dependabot security updates" and "About Dependabot version updates."

Next steps

If you are using the GitHub-recommended security configuration, and your findings indicate the security enablement settings are not meeting your needs, you should create a custom security configuration. To get started, see "Creating a custom security configuration."

If you are using a custom security configuration, and your findings indicate the security enablement settings are not meeting your needs, you can edit your existing configuration. For more information, see "Editing a custom security configuration."

Lastly, you can also edit your organization-level security settings with global settings. To learn more, see "Configuring global security settings for your organization."