How to build an open source metrics dashboard
How GitHub volunteers built an open source metrics dashboard for the World Health Organization and some best practices they picked up along the way.
How GitHub volunteers built an open source metrics dashboard for the World Health Organization and some best practices they picked up along the way.
Custom models for GitHub Copilot are now in Limited Public Beta
AWS CodeCommit is discontinuing new customer access and will no longer introduce new features. Learn how to migrate to GitHub Enterprise and why it’s the best option for you.
We surveyed 2,000 people on software development teams at enterprises in the U.S., Brazil, India, and Germany about the use, experience, and expectations around generative AI tools in software development.
In July, we experienced four incidents that resulted in degraded performance across GitHub services.
With Copilot Autofix, developers and security teams can keep new vulnerabilities out of code and confidently remediate their backlog security debt.
Five actionable tips and strategies to supercharge developer happiness—and a more innovative workplace.
In this post, I’ll exploit CVE-2024-5830, a type confusion in Chrome that allows remote code execution (RCE) in the renderer sandbox of Chrome by a single visit to a malicious site.
Explore how AI coding tools like GitHub Copilot can accelerate your journey to learn new programming languages.
Deprecation of enum field “detached” from the “get repositories associated with a code security configuration” endpoint
GitHub Staff Engineer Sarah Vessels discusses her philosophy of code review, what separates good code review from bad, her strategy for finding and reviewing code, and how to get the most from reviews of her own code.
In this blog post, we’ll explain how we discovered three critical vulnerabilities in Kafka UI and how they can be exploited.
An interview with economic researchers who are applying causal inference techniques to analyze the effect of generative AI tools on software development activity.
Pre-defined organization roles that grant access to all repositories
Drag-and-drop is a highly interactive and visual interface. We often use drag-and-drop to perform tasks like uploading files, reordering browser bookmarks, or even moving a card in solitaire.
Can an attacker execute arbitrary commands on a remote server just by sending JSON? Yes, if the running code contains unsafe deserialization vulnerabilities. But how is that possible? In this blog post, we’ll describe how unsafe deserialization vulnerabilities work and how you can detect them in Ruby projects.
Let’s take a look at 10 key moments from the first decade of the GitHub Security Bug Bounty program.
Actions: Upcoming changes to GitHub-hosted macOS runners
Learn how to use CodeQL for security research and improve your security research workflow.
Build what’s next on GitHub, the place for anyone from anywhere to build anything.
Get tickets to the 10th anniversary of our global developer event on AI, DevEx, and security.