Enterprise owners in GitHub Enterprise Cloud can now toggle Git LFS for a repository via API. Learn more about the API reference in our documentation.
npm has a new access token format
npm access tokens will now follow the established format of GitHub authentication tokens as part of our work to create a more secure supply chain.
Previously, the npm access tokens were created as a UUID pattern of 36 characters, which has limitations such as inaccurate detection of compromised npm tokens in packages and GitHub repositories.
Identifiable prefix and higher entropy pattern
With the new pattern, access tokens now start with an identifiable prefix: npm
so it is easier to be indexed by features like secret scanning and npm’s internal secret scanners. Moreover, the delimiter following after is no longer a -
but an underscore _
meaning a full token can be selected when double clicked.
The last six characters of the tokens consist of CRC32 checksum, which is encoded in Base62 to further eliminate false positives when scanning for leaked tokens.
We strongly encourage you to make the move towards the new format by resetting your existing access tokens to help mitigate any risk to compromised tokens as well as make our secret scanning detection more precise. You can reset your personal access tokens by clicking on Access tokens
under your Profile
, deleting all of your old tokens and creating new ones.
We've added support for Java 16 standard language features (such as records and pattern matching) to CodeQL. Code using those features can now benefit from CodeQL's security analysis as part of code scanning.
We also continue to support older Java versions. CodeQL is able to analyze code written in Java version 7 through 16.
Learn more about CodeQL and code scanning.