You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/checks.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -291,7 +291,7 @@ The highest score is awarded when all workflows avoid the dangerous code pattern
291
291
Risk: `High` (possibly vulnerable to attacks on known flaws)
292
292
293
293
This check tries to determine if the project uses a dependency update tool,
294
-
specifically [dependabot](https://dependabot.com/docs/config-file/) or
294
+
specifically [dependabot](https://docs.github.com/en/code-security/supply-chain-security/keeping-your-dependencies-updated-automatically/configuration-options-for-dependency-updates) or
dependencies make a project vulnerable to known flaws and prone to attacks.
297
297
These tools automate the process of updating dependencies by scanning for
@@ -309,7 +309,7 @@ low score is therefore not a definitive indication that the project is at risk.
309
309
310
310
311
311
**Remediation steps**
312
-
- Signup for automatic dependency updates with [dependabot](https://dependabot.com/docs/config-file/) or [renovatebot](https://docs.renovatebot.com/configuration-options/) and place the config file in the locations that are recommended by these tools. Due to https://github.com/dependabot/dependabot-core/issues/2804 Dependabot can be enabled for forks where security updates have ever been turned on so projects maintaining stable forks should evaluate whether this behavior is satisfactory before turning it on.
312
+
- Signup for automatic dependency updates with [dependabot](https://docs.github.com/en/code-security/supply-chain-security/keeping-your-dependencies-updated-automatically/configuration-options-for-dependency-updates) or [renovatebot](https://docs.renovatebot.com/configuration-options/) and place the config file in the locations that are recommended by these tools. Due to https://github.com/dependabot/dependabot-core/issues/2804 Dependabot can be enabled for forks where security updates have ever been turned on so projects maintaining stable forks should evaluate whether this behavior is satisfactory before turning it on.
Copy file name to clipboardExpand all lines: docs/checks/internal/checks.yaml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ checks:
50
50
Risk: `High` (possibly vulnerable to attacks on known flaws)
51
51
52
52
This check tries to determine if the project uses a dependency update tool,
53
-
specifically [dependabot](https://dependabot.com/docs/config-file/) or
53
+
specifically [dependabot](https://docs.github.com/en/code-security/supply-chain-security/keeping-your-dependencies-updated-automatically/configuration-options-for-dependency-updates) or
dependencies make a project vulnerable to known flaws and prone to attacks.
56
56
These tools automate the process of updating dependencies by scanning for
@@ -69,7 +69,7 @@ checks:
69
69
remediation:
70
70
- >-
71
71
Signup for automatic dependency updates with
72
-
[dependabot](https://dependabot.com/docs/config-file/) or
72
+
[dependabot](https://docs.github.com/en/code-security/supply-chain-security/keeping-your-dependencies-updated-automatically/configuration-options-for-dependency-updates) or
73
73
[renovatebot](https://docs.renovatebot.com/configuration-options/) and place
74
74
the config file in the locations that are recommended by these tools. Due to
75
75
https://github.com/dependabot/dependabot-core/issues/2804 Dependabot can
0 commit comments