Assuming that notification settings and Dependabot alert recipients have not been customized, which user account setting should you use to get an alert when a vulnerability is detected in one of your repositories?
Where can you use CodeQL analysis for code scanning? (Each answer presents part of the solution. Choose two.)
Assuming there is no custom Dependabot behavior configured, where possible, what does Dependabot do after sending an alert about a vulnerable dependency in a repository?
Where in the repository can you give additional users access to secret scanning alerts?
Which of the following information can be found in a repository's Security tab?
As a repository owner, you do not want to run a GitHub Actions workflow when changes are made to any .txt or markdown files. How would you adjust the event trigger for a pull request that targets the main branch? (Each answer presents part of the solution. Choose three.)
on:
pull_request:
branches: [main]
If notification and alert recipients are not customized, which users receive notifications about new Dependabot alerts in an affected repository?
You are managing code scanning alerts for your repository. You receive an alert highlighting a problem with data flow. What do you click for additional context on the alert?
Which of the following statements most accurately describes push protection for secret scanning custom patterns?
What step is required to run a SARIF-compatible (Static Analysis Results Interchange Format) tool on GitHub Actions?