Register
Login
Resources
Docs Blog Datasets Glossary Case Studies Tutorials & Webinars
Product
Data Engine LLMs Platform Enterprise
Pricing Explore
Connect to our Discord channel

about-managing-vulnerable-dependencies.md 3.4 KB

You have to be logged in to leave a comment. Sign In
title intro versions
About managing vulnerable dependencies {% data variables.product.prodname_dotcom %} helps you to avoid using third-party software that contains known vulnerabilities. [{free-pro-team *}]

{% data variables.product.prodname_dotcom %} provides the following tools for removing and avoiding vulnerable dependencies.

Dependency graph

The dependency graph is a summary of the manifest and lock files stored in a repository. It shows you the ecosystems and packages your codebase depends on (its dependencies) and the repositories and packages that depend on your project (its dependents). The information in the dependency graph is used by dependency review and {% data variables.product.prodname_dependabot %}. For more information, see "About the dependency graph."

Dependency review

By checking the dependency reviews on pull requests you can avoid introducing vulnerabilities from dependencies into your codebase. If the pull requests adds a vulnerable dependency, or changes a dependency to a vulnerable version, this is highlighted in the dependency review. You can change the dependency to a patched version before merging the pull request. For more information, see "Reviewing dependency changes in a pull request."

{% data variables.product.prodname_dependabot_alerts %}

{% data variables.product.prodname_dotcom %} can create {% data variables.product.prodname_dependabot_alerts %} when it detects vulnerable dependencies in your repository. The alert is displayed on the Security tab for the repository. The alert includes a link to the affected file in the project, and information about a fixed version. {% data variables.product.prodname_dotcom %} also notifies the maintainers of the repository, according to their notification preferences. For more information, see "About alerts for vulnerable dependencies."

{% data variables.product.prodname_dependabot_security_updates %}

When {% data variables.product.prodname_dotcom %} generates a {% data variables.product.prodname_dependabot %} alert for a vulnerable dependency in your repository, {% data variables.product.prodname_dependabot %} can automatically try to fix it for you. {% data variables.product.prodname_dependabot_security_updates %} are automatically generated pull requests that update a vulnerable dependency to a fixed version. For more information, see "About {% data variables.product.prodname_dependabot_security_updates %}."

{% data variables.product.prodname_dependabot_version_updates %}

Enabling {% data variables.product.prodname_dependabot_version_updates %} takes the effort out of maintaining your dependencies. With {% data variables.product.prodname_dependabot_version_updates %}, whenever {% data variables.product.prodname_dotcom %} identifies an outdated dependency, it raises a pull request to update the manifest to the latest version of the dependency. By contrast, {% data variables.product.prodname_dependabot_security_updates %} only raises pull requests to fix vulnerable dependencies. For more information, see "About Dependabot version updates."

Tip!

Press p or to see the previous file or, n or to see the next file

Comments

Loading...