Ensure vulnerability scanning is enabled for repository dependencies
Why this matters
Modern software development relies heavily on open-source dependencies, which may include known vulnerabilities.
Without automated vulnerability scanning, these risks can remain undetected, exposing your codebase to potential exploitation, data breaches, or supply-chain attacks.
Enabling dependency scanning ensures that:
- GitHub continuously monitors your project’s dependency graph
- Known vulnerabilities are detected and reported through Dependabot alerts
- Developers receive proactive notifications to update or patch vulnerable packages
Without this control, outdated or insecure dependencies can persist unnoticed in production systems.
What this check does
This check verifies that dependency vulnerability scanning is enabled for the repository. Specifically, it confirms that:
- Dependency graph is activated
- Dependabot alerts are turned on to detect and notify about vulnerable dependencies
GitHub’s Dependabot feature automatically cross-references your repository’s dependencies against public vulnerability databases.
How to fix it
From the GitHub Web Console
- Go to your repository on GitHub.
- Navigate to Settings → Security & analysis.
- Under Dependency graph, ensure that Enable is selected.
- Under Dependabot alerts, click Enable Dependabot alerts.
- (Optional) Also enable Dependabot security updates to automatically create pull requests for vulnerable dependency upgrades.
GitHub will begin scanning your project’s dependency manifests and alert you if any vulnerabilities are detected.
Exceptions
- Private repositories require GitHub Advanced Security or GitHub Enterprise to use Dependabot alerts.
- Dependabot supports most common package ecosystems (npm, Maven, pip, RubyGems, Composer, etc.); unsupported dependency types won’t generate alerts.
- The dependency graph and alerts must be enabled per repository—they are not inherited automatically from the organization level.