-- [Configure and Use Dependency Management]
You have enabled security updates for a repository. When does GitHub mark a Dependabot alert as resolved for that repository?
A Dependabot alert is marked as resolved only after the related pull request is merged into the repository. This indicates that the vulnerable dependency has been officially replaced with a secure version in the active codebase.
Simply generating a PR or passing checks does not change the alert status; merging is the key step.
-- [Configure and Use Dependency Management]
You have enabled security updates for a repository. When does GitHub mark a Dependabot alert as resolved for that repository?
A Dependabot alert is marked as resolved only after the related pull request is merged into the repository. This indicates that the vulnerable dependency has been officially replaced with a secure version in the active codebase.
Simply generating a PR or passing checks does not change the alert status; merging is the key step.
-- [Configure and Use Dependency Management]
What are Dependabot security updates?
Dependabot security updates are automated pull requests triggered when GitHub detects a vulnerability in a dependency listed in your manifest or lockfile. These PRs upgrade the dependency to the minimum safe version that fixes the vulnerability.
This is separate from regular updates (which keep versions current even if not vulnerable).
-- [Configure and Use Dependency Management]
Which of the following options would close a Dependabot alert?
A Dependabot alert is only marked as resolved when the related vulnerability is no longer present in your code --- specifically after you merge a pull request that updates the vulnerable dependency.
Simply viewing alerts or graphs does not affect their status. Ignoring the alert by leaving the repo unchanged keeps the vulnerability active and unresolved.
-- [Configure and Use Code Scanning]
After investigating a code scanning alert related to injection, you determine that the input is properly sanitized using custom logic. What should be your next step?
When you identify that a code scanning alert is a false positive---such as when your code uses a custom sanitization method not recognized by the analysis---you should dismiss the alert with the reason 'false positive.' This action helps improve the accuracy of future analyses and maintains the relevance of your security alerts.
As per GitHub's documentation:
'If you dismiss a CodeQL alert as a false positive result, for example because the code uses a sanitization library that isn't supported, consider contributing to the CodeQL repository and improving the analysis.'
By dismissing the alert appropriately, you ensure that your codebase's security alerts remain actionable and relevant.
Lorriane
5 days agoGretchen
13 days agoJesse
20 days agoKrissy
28 days agoDick
1 month agoGianna
1 month agoEllsworth
2 months agoDaniela
2 months agoCaprice
2 months agoQuiana
2 months agoLanie
3 months agoJuan
3 months agoDarrin
3 months agoGregoria
3 months agoKathryn
4 months agoCarmela
4 months agoDella
4 months agoTesha
4 months agoAlva
5 months agoVerona
5 months agoMadalyn
5 months agoMargarett
5 months agoDaren
5 months agoCora
6 months agoJesus
6 months ago