Skip to main content
GitHub Docs
Version:
Free, Pro, & Team
Search or ask Copilot
Search or ask
Copilot
Select language: current language is English
Search or ask Copilot
Search or ask
Copilot
Open menu
Open Sidebar
Security and code quality
/
Reference
/
Code scanning
/
CodeQL
/
CodeQL CLI manual
/
database export-diagnostics
Home
Security and code quality
Getting started
GitHub security features
Secure repository quickstart
Concepts
Secret security
Secret leakage risks
Secret scanning
Push protection
Secret protection tools
Secret scanning alerts
Custom patterns
Validity checks
Delegated bypass
Bypass requests
Secret scanning for partners
GitHub secret types
Push protection metrics
Command line protection
Push protection and the GitHub MCP server
Push protection from the REST API
Code scanning
Introduction
Code scanning alerts
Code security risk assessment
Copilot Autofix
Setup types
Integration with code scanning
SARIF files
Alert tracking with issues
Merge protection
Multi-repository variant analysis
CodeQL
CodeQL code scanning
CodeQL for compiled languages
CodeQL query suites
Custom queries
CodeQL CLI
CodeQL for VS Code
CodeQL workspaces
Query reference files
CodeQL query packs
Tool status page
Pull request alert metrics
Repository properties
GitHub Code Quality
Supply chain security
Supply chain features
Dependency best practices
Dependency graph
Dependency graph data
Dependency review
Dependabot alerts
Dependabot malware alerts
Dependabot alert metrics
Dependabot security updates
Dependabot version updates
Dependabot pull requests
Multi-ecosystem updates
dependabot.yml file
Dependabot auto-triage rules
Dependabot on Actions
Dependabot job logs
Immutable releases
Linked artifacts
Vulnerability reporting
GitHub Advisory database
Repository security advisories
Global security advisories
Coordinated disclosure
Vulnerability exposure
Security at scale
Select pilot repositories
Organization security
Security overview
Security campaigns
Audit security alerts
Delegated alert dismissal
How-tos
Secure at scale
Configure enterprise security
Configure specific tools
Allow Code Quality
Configure VNET
Configure organization security
Establish complete coverage
Create custom configuration
Apply custom configuration
Configure global settings
Manage your coverage
Edit custom configuration
Filter repositories
Detach security configuration
Delete custom configuration
Configure specific tools
Assess your secret risk
Assess your vulnerability risk
View risk report
Secret protection pricing
Protect your secrets
Code scanning at scale
CodeQL advanced setup at scale
Enforce dependency review
Manage usage and access
Give access to private registries
Manage paid GHAS use
Secure your secrets
Detect secret leaks
Enable secret scanning
Enable for non-provider patterns
Enable generic secret detection
Customize leak detection
Define custom patterns
Generate regular expressions
Manage custom patterns
Exclude folders and files
Enable validity checks
Enable metadata checks
Prevent future leaks
Enable push protection
Manage user push protection
Work with leak prevention
Push protection on the command line