Beginner’s guide to GitHub: Creating a pull request
As part of the GitHub for Beginners guide, learn how to create pull requests. This will enable you to suggest changes to existing repositories.
As part of the GitHub for Beginners guide, learn how to create pull requests. This will enable you to suggest changes to existing repositories.
The GitHub Enterprise Server 3.14 Release Candidate is available
Secret scanning alerts for non-provider patterns and passwords are retrievable with the REST API
To enhance your coding experience, AI tools should excel at saving you time with repetitive, administrative tasks, while providing accurate solutions to assist developers. Today, we’re spotlighting three updates designed to increase efficiency and boost developer creativity.
Introducing the generally available capability of GitHub Artifact Attestations to secure your cloud-native supply chain packages and images.
Git 2.46 is here with new features like pseudo-merge bitmaps, more capable credential helpers, and a new git config command. Check out our coverage on some of the highlights here.
Automatically submit your Maven transitive dependencies to the dependency graph
Validation on package name when submitting a new GitHub security advisory (GHSA)
Deprecation of enum field “detached” from the “get repositories associated with a code security configuration” endpoint
Solving and staying ahead of problems when scaling up a system of GitHub’s size is a delicate process. Here’s a look at some of the tools in GitHub’s toolbox, and how we’ve used them to solve problems.
Enable secret scanning for non-provider patterns on repositories with the REST API
GitHub Staff Engineer Sarah Vessels discusses her philosophy of code review, what separates good code review from bad, her strategy for finding and reviewing code, and how to get the most from reviews of her own code.
Deprecation of API endpoint to enable or disable a security feature for an organization
Security overview dashboards, secret scanning metrics and enablement trends reports are now generally available
Code security configurations are supported in the audit log
An interview with economic researchers who are applying causal inference techniques to analyze the effect of generative AI tools on software development activity.
Secret scanning detects generic passwords with AI (public beta)
Filter repositories by configuration attachment failure reason in the code security configurations UI
Secret scanning AI-generated custom patterns (general availability)
Build what’s next on GitHub, the place for anyone from anywhere to build anything.