Ensure vulnerability scanning is enabled for repository dependencies

Framework Reference: A.8.8 (Management of technical vulnerabilities) Integration: GitHub – Dependabot & Dependency Graph

Why this matters

Modern software development relies heavily on open-source dependencies, which may include known vulnerabilities.
Without automated vulnerability scanning, these risks can remain undetected, exposing your codebase to potential exploitation, data breaches, or supply-chain attacks.

Enabling dependency scanning ensures that:

  • GitHub continuously monitors your project’s dependency graph
  • Known vulnerabilities are detected and reported through Dependabot alerts
  • Developers receive proactive notifications to update or patch vulnerable packages

Without this control, outdated or insecure dependencies can persist unnoticed in production systems.


What this check does

This check verifies that dependency vulnerability scanning is enabled for the repository. Specifically, it confirms that:

  • Dependency graph is activated
  • Dependabot alerts are turned on to detect and notify about vulnerable dependencies

GitHub’s Dependabot feature automatically cross-references your repository’s dependencies against public vulnerability databases.


How to fix it

From the GitHub Web Console

  1. Go to your repository on GitHub.
  2. Navigate to Settings → Security & analysis.
  3. Under Dependency graph, ensure that Enable is selected.
  4. Under Dependabot alerts, click Enable Dependabot alerts.
  5. (Optional) Also enable Dependabot security updates to automatically create pull requests for vulnerable dependency upgrades.

GitHub will begin scanning your project’s dependency manifests and alert you if any vulnerabilities are detected.


Exceptions

  • Private repositories require GitHub Advanced Security or GitHub Enterprise to use Dependabot alerts.
  • Dependabot supports most common package ecosystems (npm, Maven, pip, RubyGems, Composer, etc.); unsupported dependency types won’t generate alerts.
  • The dependency graph and alerts must be enabled per repository—they are not inherited automatically from the organization level.

Further Resources

Was this article helpful?