Explore by product
Code security
Code security guides
Learn about the different ways that GitHub can help you improve your code's security.
Fix and disclose a security vulnerability
Using security advisories to privately fix a reported vulnerability and get a CVE.Start path- 1Overview
Coordinated disclosure
Vulnerability disclosure is a coordinated effort between security reporters and repository maintainers. - 2How-to guide
Create advisories
You can create a draft security advisory to privately discuss and fix a security vulnerability in your open source project. - 3How-to guide
Add collaborator to advisory
You can add other users or teams to collaborate on a security advisory with you. - 4How-to guide
Temporary private forks
You can create a temporary private fork to privately collaborate on fixing a security vulnerability in your repository. - 5How-to guide
Publish advisories
You can publish a security advisory to alert your community about a security vulnerability in your project. - 6How-to guide
Edit advisories
You can edit the metadata and description for a security advisory if you need to update details or correct errors. - 7How-to guide
Withdraw advisories
You can withdraw a security advisory that you've published. - 8How-to guide
Remove collaborators
When you remove a collaborator from a security advisory, they lose read and write access to the security advisory's discussion and metadata.
Code security learning paths
Get notifications for vulnerable dependencies
Set up Dependabot to alert you to new vulnerabilities in your dependencies.
Get pull requests to update your vulnerable dependencies
Set up Dependabot to create pull requests when new vulnerabilities are reported.
Keep your dependencies up-to-date
Use Dependabot to check for new releases and create pull requests to update your dependencies.
Explore and manage security alerts
Learn where to find and resolve security alerts.
Scan for secrets
Set up secret scanning to guard against accidental check-ins of tokens, passwords, and other secrets to your repository.
Run code scanning with GitHub Actions
Check your default branch and every pull request to keep vulnerabilities and errors out of your repository.
Run CodeQL code scanning in your CI
Set up CodeQL within your existing CI and upload results to GitHub code scanning.
Integrate with code scanning
Upload code analysis results from third-party systems to GitHub using SARIF.
Help us make these docs great!
All GitHub docs are open source. See something that's wrong or unclear? Submit a pull request.
Make a contribution