Skip to content

Commit aa17a0e

Browse files
authored
Merge pull request #43292 from github/repo-sync
Repo sync
2 parents 989271c + 09438af commit aa17a0e

File tree

72 files changed

+677
-242
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

72 files changed

+677
-242
lines changed

content/account-and-profile/how-tos/organization-membership/publicizing-or-hiding-organization-membership.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Publicizing or hiding organization membership
3-
intro: Show avatars for organizations where youre an organization member.
3+
intro: Show avatars for organizations where you're an organization member.
44
redirect_from:
55
- /articles/publicizing-or-concealing-organization-membership
66
- /articles/publicizing-or-hiding-organization-membership

content/actions/reference/workflows-and-actions/metadata-syntax.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Metadata syntax reference
33
shortTitle: Metadata syntax
4-
intro: You can create actions to perform tasks in your repository. If youre making a custom action, it will require a metadata file that uses YAML syntax.
4+
intro: You can create actions to perform tasks in your repository. If you're making a custom action, it will require a metadata file that uses YAML syntax.
55
redirect_from:
66
- /articles/metadata-syntax-for-github-actions
77
- /github/automating-your-workflow-with-github-actions/metadata-syntax-for-github-actions

content/code-security/concepts/code-scanning/about-code-scanning-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ With a {% data variables.copilot.copilot_enterprise %} license, you can also ask
4040

4141
{% ifversion security-overview-org-codeql-pr-alerts %}
4242

43-
For {% data variables.product.prodname_code_scanning %} alerts from {% data variables.product.prodname_codeql %} analysis, you can use security overview to see how {% data variables.product.prodname_codeql %} is performing in pull requests in repositories across your organization, and to identify repositories where you may need to take action. For more information, see [AUTOTITLE](/code-security/security-overview/viewing-metrics-for-pull-request-alerts).
43+
For {% data variables.product.prodname_code_scanning %} alerts from {% data variables.product.prodname_codeql %} analysis, you can use security overview to see how {% data variables.product.prodname_codeql %} is performing in pull requests in repositories across your organization, and to identify repositories where you may need to take action. For more information, see [AUTOTITLE](/code-security/concepts/code-scanning/pull-request-alert-metrics).
4444

4545
{% endif %}
4646

content/code-security/concepts/code-scanning/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,4 +23,5 @@ children:
2323
- /multi-repository-variant-analysis
2424
- /codeql
2525
- /tool-status-page
26+
- /pull-request-alert-metrics
2627
---
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
---
2+
title: CodeQL pull request alert metrics
3+
shortTitle: Pull request alert metrics
4+
intro: Understand {% data variables.product.prodname_codeql %}'s performance in pull requests across your organizations.
5+
permissions: '{% data reusables.permissions.security-overview %}'
6+
product: '{% data reusables.gated-features.security-overview-fpt-cs-only %}'
7+
topics:
8+
- Security overview
9+
- Code Security
10+
- Code scanning
11+
- CodeQL
12+
- Organizations
13+
- Teams
14+
contentType: concepts
15+
versions:
16+
feature: security-overview-org-codeql-pr-alerts
17+
---
18+
19+
## Overview
20+
21+
The metrics overview for {% data variables.product.prodname_codeql %} pull request alerts on security overview helps you understand how well {% data variables.product.prodname_codeql %} is preventing vulnerabilities in pull requests in your organization or across organizations in your enterprise. You can view the entire dataset or filter for specific criteria, making it easy to identify repositories where you may need to take action to find and reduce security risks.
22+
23+
## Available metrics
24+
25+
The overview shows you a summary of how many vulnerabilities prevented by {% data variables.product.prodname_codeql %} have been caught in pull requests. The metrics are only tracked for pull requests that have been merged into the default branches of repositories in your organizations.
26+
27+
You can also find more granular metrics, such as how many alerts were fixed{% ifversion code-scanning-autofix %} with and without {% data variables.copilot.copilot_autofix_short %} suggestions{% endif %}, how many were unresolved and merged, and how many were dismissed as false positive or risk accepted.
28+
29+
You can also view:
30+
31+
* The rules that are causing the most alerts, and how many alerts each rule is associated with.
32+
33+
* The number of alerts that were merged into the default branch without resolution, and the number of alerts dismissed as an acceptable risk.
34+
35+
{% ifversion code-scanning-autofix %}
36+
* The number of alerts that were fixed with an accepted {% data variables.copilot.copilot_autofix_short %} suggestion, displayed as a fraction of how many total {% data variables.copilot.copilot_autofix_short %} suggestions were available.
37+
38+
* Remediation rates, in a graph showing the percentage of alerts that were remediated with an available {% data variables.copilot.copilot_autofix_short %} suggestion, and the percentage of alerts that were remediated without a {% data variables.copilot.copilot_autofix_short %} suggestion.
39+
40+
* Mean time to remediate, in a graph showing the average age of closed alerts that were remediated with an available {% data variables.copilot.copilot_autofix_short %} suggestion, and the average age of closed alerts that were remediated without a {% data variables.copilot.copilot_autofix_short %} suggestion.
41+
{% endif %}
42+
43+
{% ifversion code-scanning-autofix %}
44+
> [!NOTE] Metrics for {% data variables.copilot.copilot_autofix_short %} will be shown only for repositories where {% data variables.copilot.copilot_autofix_short %} is enabled.
45+
{% else %}
46+
> [!NOTE] Metrics for {% data variables.copilot.copilot_autofix_short %} are omitted because {% data variables.copilot.copilot_autofix_short %} is available only on {% data variables.product.github %} cloud platforms.
47+
{% endif %}
48+
49+
## Visibility
50+
51+
You can see {% data variables.product.prodname_code_scanning %} metrics for a repository if you have:
52+
53+
* The `admin` role for the repository
54+
* A custom repository role with the "View {% data variables.product.prodname_code_scanning %} alerts" fine-grained permissions for the repository
55+
* Access to alerts for the repository
56+
57+
## Next steps
58+
59+
To find your pull request alert metrics, see [AUTOTITLE](/code-security/how-tos/view-and-interpret-data/analyze-organization-data/viewing-metrics-for-pull-request-alerts).

content/code-security/concepts/secret-security/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ children:
2121
- /about-bypass-requests-for-push-protection
2222
- /about-secret-scanning-for-partners
2323
- /github-secret-types
24+
- /push-protection-metrics
2425
- /push-protection-from-the-command-line
2526
- /working-with-push-protection-and-the-github-mcp-server
2627
- /working-with-push-protection-from-the-rest-api
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
---
2+
title: Secret scanning push protection metrics
3+
shortTitle: Push protection metrics
4+
intro: 'Understand push protection''s performance across your organizations.'
5+
permissions: '{% data reusables.permissions.security-overview %}'
6+
product: '{% data reusables.gated-features.security-overview-fpt-sp-only %}'
7+
versions:
8+
fpt: '*'
9+
ghes: '*'
10+
ghec: '*'
11+
topics:
12+
- Security overview
13+
- Secret Protection
14+
- Secret scanning
15+
- Organizations
16+
- Teams
17+
contentType: concepts
18+
---
19+
20+
## Overview
21+
22+
The metrics overview for {% data variables.product.prodname_secret_scanning %} push protection on security overview helps you understand how well you are preventing secret leaks in your organization or across organizations in your enterprise. You can view the entire dataset or filter for specific criteria, making it easy to identify repositories where you may need to take action to prevent future leaks.
23+
24+
## Available metrics
25+
26+
The overview shows you a summary of how many pushes containing secrets have been successfully blocked by push protection, as well as how many times push protection was bypassed.
27+
28+
You can also find more granular metrics, such as:
29+
* The secret types that have been blocked or bypassed the most
30+
* The repositories that have had the most pushes blocked
31+
* The repositories that are bypassing push protection the most
32+
* The percentage distribution of reasons that users give when they bypass the protection
33+
34+
## Visibility
35+
36+
You can see {% data variables.product.prodname_secret_scanning %} metrics for a repository if you have:
37+
38+
* The `admin` role for the repository
39+
* A custom repository role with the "View {% data variables.product.prodname_secret_scanning %} alerts" fine-grained permissions for the repository
40+
* Access to alerts for the repository
41+
42+
## Next steps
43+
44+
To find your push protection metrics, see [AUTOTITLE](/code-security/how-tos/view-and-interpret-data/analyze-organization-data/viewing-metrics-for-secret-scanning-push-protection).

content/code-security/concepts/vulnerability-reporting-and-management/about-your-exposure-to-vulnerabilities-in-your-code-and-in-dependencies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: About exposure to vulnerabilities in your code and in dependencies
33
shortTitle: Vulnerability exposure
4-
intro: Understand how vulnerabilities in your own code and in third-party dependencies contribute to your organizations overall security exposure, and how to measure and reduce that risk.
4+
intro: Understand how vulnerabilities in your own code and in third-party dependencies contribute to your organization's overall security exposure, and how to measure and reduce that risk.
55
allowTitleToDifferFromFilename: true
66
product: '{% data reusables.gated-features.ghas-billing %}'
77
versions:

content/code-security/how-tos/manage-security-alerts/manage-code-scanning-alerts/assessing-code-scanning-alerts-for-your-repository.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ With a {% data variables.copilot.copilot_enterprise %} license, you can ask {% d
5858

5959
## Viewing metrics for {% data variables.product.prodname_codeql %} pull request alerts for an organization
6060

61-
For {% data variables.product.prodname_code_scanning %} alerts from {% data variables.product.prodname_codeql %} analysis, you can use security overview to see how {% data variables.product.prodname_codeql %} is performing in pull requests in repositories where you have write access across your organization, and to identify repositories where you may need to take action. For more information, see [AUTOTITLE](/code-security/security-overview/viewing-metrics-for-pull-request-alerts).
61+
For {% data variables.product.prodname_code_scanning %} alerts from {% data variables.product.prodname_codeql %} analysis, you can use security overview to see how {% data variables.product.prodname_codeql %} is performing in pull requests in repositories where you have write access across your organization, and to identify repositories where you may need to take action. For more information, see [AUTOTITLE](/code-security/concepts/code-scanning/pull-request-alert-metrics).
6262

6363
{% endif %}
6464

content/code-security/how-tos/secure-at-scale/configure-enterprise-security/manage-your-coverage/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Manage your coverage
3-
intro: Review and manage your enterprises repository security coverage by adjusting which repositories are included in your custom security configurations and removing unneeded configurations.
3+
intro: Review and manage your enterprise's repository security coverage by adjusting which repositories are included in your custom security configurations and removing unneeded configurations.
44
versions:
55
fpt: '*'
66
ghes: '*'

0 commit comments

Comments
 (0)