English
Code security
Free, Pro, & Team
English
Code security guides
Learn about the different ways that GitHub can help you improve your code's security.
Fix and disclose a security vulnerability
Using security advisories to privately fix a reported vulnerability and get a CVE.Start path- 1Overview
About coordinated disclosure of security vulnerabilities
Vulnerability disclosure is a coordinated effort between security reporters and repository maintainers. - 2How-to guide
Creating a security advisory
You can create a draft security advisory to privately discuss and fix a security vulnerability in your open source project. - 3How-to guide
Adding a collaborator to a security advisory
You can add other users or teams to collaborate on a security advisory with you. - 4How-to guide
Collaborating in a temporary private fork to resolve a security vulnerability
You can create a temporary private fork to privately collaborate on fixing a security vulnerability in your repository. - 5How-to guide
Publishing a security advisory
You can publish a security advisory to alert your community about a security vulnerability in your project. - 6How-to guide
Editing a security advisory
You can edit the metadata and description for a security advisory if you need to update details or correct errors. - 7How-to guide
Withdrawing a security advisory
You can withdraw a security advisory that you've published. - 8How-to guide
Removing a collaborator from a security advisory
When you remove a collaborator from a security advisory, they lose read and write access to the security advisory's discussion and metadata.
Code security learning paths
Get notifications for vulnerable dependencies
Set up Dependabot to alert you to new vulnerabilities in your dependencies.
Get pull requests to update your vulnerable dependencies
Set up Dependabot to create pull requests when new vulnerabilities are reported.
Keep your dependencies up-to-date
Use Dependabot to check for new releases and create pull requests to update your dependencies.
Scan for secrets
Set up secret scanning to guard against accidental check-ins of tokens, passwords, and other secrets to your repository.
Run code scanning with GitHub Actions
Check your default branch and every pull request to keep vulnerabilities and errors out of your repository.
Run CodeQL code scanning in your CI
Set up CodeQL within your existing CI and upload results to GitHub code scanning.
Integrate with code scanning
Upload code analysis results from third-party systems to GitHub using SARIF.
All Code security guides
Help us make these docs great!
All GitHub docs are open source. See something that's wrong or unclear? Submit a pull request.
Make a contribution