Skip to main content

Dependabot 경고 정보

Dependabot alerts를 활용하면 보안 위협이 되기 전에 취약한 종속성을 미리 발견하고 해결할 수 있습니다.

누가 이 기능을 사용할 수 있나요?

Dependabot alerts는 조직 소유 및 사용자 소유 저장소에서 지원됩니다.

Software often relies on packages from various sources, creating dependency relationships that can unknowingly introduce security vulnerabilities. When your code depends on packages with known security vulnerabilities, you become a target for attackers seeking to exploit your system—potentially gaining access to your code, data, customers, or contributors. Dependabot alerts notify you about vulnerable dependencies so you can upgrade to secure versions and protect your project.

When Dependabot sends alerts

Dependabot scans your repository's default branch and sends alerts when:

  • A new vulnerability is added to the GitHub Advisory Database
  • Your dependency graph changes—for example, when you push commits that update packages or versions

For supported ecosystems, see Dependency graph supported package ecosystems.

Understanding alerts

When GitHub detects a vulnerable dependency, a Dependabot alert appears on the repository's Security tab and dependency graph. Each alert includes:

  • A link to the affected file
  • Details about the vulnerability and its severity
  • Information about a fixed version (when available)

For information about viewing and managing alerts, see Viewing and updating Dependabot alerts.

Enabling alerts

Repository administrators and organization owners can enable Dependabot alerts for their repositories and organizations. When enabled, GitHub immediately generates the dependency graph and creates alerts for any vulnerable dependencies it identifies. Repository administrators can grant access to additional people or teams.

See Configuring Dependabot alerts.

Notifications for alerts

By default, GitHub sends email notifications about new alerts to people who both:

  • Have write, maintain, or admin permissions to a repository
  • Are watching the repository and have enabled notifications for security alerts or for all activity on the repository

You can override the default behavior by choosing the type of notifications you want to receive, or switching notifications off altogether in the settings page for your user notifications at https://github.com/settings/notifications.

Regardless of your notification preferences, when Dependabot is first enabled, GitHub does not send notifications for all vulnerable dependencies found in your repository. Instead, you will receive notifications for new vulnerable dependencies identified after Dependabot is enabled, if your notification preferences allow it.

If you are concerned about receiving too many notifications, we recommend leveraging Dependabot auto-triage rules to auto-dismiss low-risk alerts. Rules are applied before alert notifications are sent, so alerts that are auto-dismissed upon creation do not send notifications. See About Dependabot auto-triage rules.

Alternatively, you can opt into the weekly email digest, or even completely turn off notifications while keeping Dependabot alerts enabled.

Limitations

Dependabot alerts have some limitations:

  • Alerts can't catch every security issue. Always review your dependencies and keep manifest and lock files up to date for accurate detection.
  • New vulnerabilities may take time to appear in the GitHub Advisory Database and trigger alerts.
  • Only advisories reviewed by GitHub trigger alerts.
  • Dependabot doesn't scan archived repositories.
  • Dependabot doesn't generate alerts for malware.
  • For GitHub Actions, Dependabot alerts are only generated for actions that use semantic versioning, not SHA versioning.

GitHub never publicly discloses vulnerabilities for any repository.

Further reading