Security and code quality documentation |
Security and code quality |
Build security and code quality into your {% data variables.product.github %} workflow to secure your software supply chain, prevent data leaks, and automatically find and fix vulnerabilities and code health issues in your codebase. |
|
| overview |
generate_secret_risk_assessment_report_for_free |
{% ifversion ghes %}/code-security/getting-started/github-security-features{% endif %} |
{% ifversion secret-risk-assessment %}/code-security/how-tos/secure-at-scale/configure-organization-security/configure-specific-tools/assess-your-secret-risk{% endif %} |
|
| startHere |
guideCards |
popular |
{% ifversion fpt or ghec %}/code-security/getting-started/github-security-features{% endif %} |
/code-security/getting-started/quickstart-for-securing-your-repository |
{% ifversion ghes %}/code-security/secret-scanning/working-with-secret-scanning-and-push-protection{% endif %} |
/code-security/tutorials/secure-your-dependencies/dependabot-quickstart-guide |
/code-security/how-tos/scan-code-for-vulnerabilities/configure-code-scanning/configuring-default-setup-for-code-scanning |
|
/code-security/trialing-github-advanced-security/planning-a-trial-of-ghas |
/code-security/secret-scanning/enabling-secret-scanning-features |
/code-security/how-tos/scan-code-for-vulnerabilities/configure-code-scanning/configuring-default-setup-for-code-scanning |
/code-security/how-tos/secure-your-supply-chain/secure-your-dependencies/configuring-dependabot-security-updates |
/code-security/how-tos/secure-your-supply-chain/secure-your-dependencies/configuring-dependabot-version-updates |
|
{% ifversion secret-risk-assessment %}/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/about-secret-risk-assessment{% endif %} |
{% ifversion ghes %}/admin/release-notes{% endif %} |
/code-security/concepts/vulnerability-reporting-and-management/about-coordinated-disclosure-of-security-vulnerabilities |
/code-security/tutorials/secure-your-organization/best-practices-for-preventing-data-leaks-in-your-organization |
/code-security/tutorials/secure-your-organization/best-practice-fix-alerts-at-scale |
/code-security/concepts/supply-chain-security/best-practices-for-maintaining-dependencies |
|
|
| label |
versions |
security-and-compliance |
|
|
product-landing |
|
Repositories |
Dependencies |
Vulnerabilities |
|
/getting-started |
/concepts |
/how-tos |
/reference |
/tutorials |
/responsible-use |
|