At GitHub, we believe in providing developer-first experiences to help you keep your code secure. Since we launched Dependabot alerts nearly four years ago, we’ve alerted users on over 425 million potential vulnerabilities in their open source dependencies. Today, we’re rolling out improvements to Dependabot alerts that make them easier to understand and remediate.
What’s new
More descriptive Dependabot alerts
We’ve made it easier to quickly assess, prioritize, and act on Dependabot alerts.
Demo of Dependabot alerts descriptions. You can also now use new filter options, including the new search filter field which supports options like has:patch and full text searching of advisories.
Starting today, Dependabot alerts are now displayed with one alert per advisory and dependency manifest, rather than being grouped by package.
With this change, Dependabot alerts can now surface more useful information about each vulnerability—for example, alerts will include more descriptive alert titles, detailed breakdowns on alert severity scoring, and updated information about linked pull requests.
Dependabot update integration demo. If you don’t enable Dependabot security updates for your repository, you can still manually create Dependabot security update pull requests from the Dependabot alert details page.
Dependabot alerts across your repositories now have improved searching and tracking. Each alert now has a unique numeric identifier, which will soon also be available via the GraphQL API. The alert index page has been redesigned with new filtering options that make it easier to search, including a new search filter field with full-text search of alerts.
Improvements to the alert lifecycle
As we improve how alerts are viewed, we also have invested in how alerts are managed throughout their lifecycle.
Fixed alerts demo. Dependabot alerts now persist after being fixed.
As of today, Dependabot alerts will now persist and continue to appear under the “Closed” tab in the UI after they’re fixed. Later this month, they’ll also be available via the GraphQL API. As a follow-up to this release, we’ll also be shipping the ability to reopen dismissed alerts.
Dependabot org-level alerts. GitHub Advanced Security customers can now view org-level alerts in the Security Overview.
Finally, starting today, GitHub Advanced Security customers can now view all their organization-level Dependabot alerts in the “Organization Security” tab. This view is available to organization owners and members of teams with the security manager role. Of course, repository-level Dependabot alerts and PRs will remain free forever. 💖
What’s next
Driven by your feedback, these changes are the first step towards improving Dependabot alerts. We’re continuing to work on addressing your top concerns and feedback for Dependabot, including better APIs, noise filtering, actionability, and configurability of alerts, and more.
In this blog, I’ll look at CVE-2022-46395, a variant of CVE-2022-36449 (Project Zero issue 2327), and use it to gain arbitrary kernel code execution and root privileges from the untrusted app domain on an Android phone that uses the Arm Mali GPU. I’ll also explain how root cause analysis of CVE-2022-36449 led to the discovery of CVE-2022-46395.
GitHub Advanced Security for Azure DevOps is now available for public preview, making GitHub’s same application security testing tools natively available on Azure Repos.
GitHub is the home for all developers and on this Global Accessibility Awareness Day we are thrilled to celebrate the achievements of disabled developers and recent ships that help them build on GitHub.