About the security overview

You can view, filter, and sort security alerts for repositories owned by your organization or team in one place: the Security Overview page.

The security overview for your organization is available if you have a license for GitHub Advanced Security. For more information, see "About GitHub Advanced Security."

Note: The security overview is currently in beta and subject to change.

About the security overview

You can use the security overview for a high-level view of the security status of your organization or to identify problematic repositories that require intervention. At the organization-level, the security overview displays aggregate and repository-specific security information for repositories owned by your organization. At the team-level, the security overview displays repository-specific security information for repositories that the team has admin privileges for. For more information, see "Managing team access to an organization repository."

The security overview indicates whether security features are enabled for repositories owned by your organization and consolidates alerts for each feature. Security features include GitHub Advanced Security features, such as code scanning and secret scanning, as well as Dependabot alerts. For more information about GitHub Advanced Security features, see "About GitHub Advanced Security." For more information about Dependabot alerts, see "About alerts for vulnerable dependencies."

For more information about securing your code at the repository and organization levels, see "Securing your repository" and "Securing your organization."

In the security overview, you can view, sort, and filter alerts to understand the security risks in your organization and in specific repositories. You can apply multiple filters to focus on areas of interest. For example, you can identify private repositories that have a high number of Dependabot alerts or repositories that have no code scanning alerts.

The security overview for an organization

For each repository in the security overview, you will see icons for each type of security feature and how many alerts there are of each type. If a security feature is not enabled for a repository, the icon for that feature will be grayed out.

Icons in the security overview

IconMeaning
Code scanning alerts. For more information, see "About code scanning."
Secret scanning alerts. For more information, see "About secret scanning."
Dependabot alerts. For more information, see "About alerts for vulnerable dependencies."
The security feature is enabled, but does not raise alerts in this repository.
The security feature is not supported in this repository.

By default, archived repositories are excluded from the security overview for an organization. You can apply filters to view archived repositories in the security overview. For more information, see "Filtering the list of alerts."

The security overview displays active alerts raised by security features. If there are no alerts in the security overview for a repository, undetected security vulnerabilities or code errors may still exist.

Viewing the security overview for an organization

Organization owners can view the security overview for an organization.

  1. On GitHub, navigate to the main page of the organization.
  2. Under your organization name, click Security. Organization security button
  3. To view aggregate information about alert types, click Show more. Show more button
  4. Optionally, filter the list of alerts. You can click multiple filters in the drop-down filter menus to narrow your search. You can also type search qualifiers in the Search repositories field. For more information about the available qualifiers, see "Filtering the list of alerts." The drop-down filter menus and Search repositories field in the security overview

Viewing the security overview for a team

Members of a team can see the security overview for repositories that the team has admin privileges for.

  1. In the top right corner of GitHub, click your profile photo, then click Your organizations. Your organizations in the profile menu

  2. Click the name of your organization. Organization name in list of organizations

  3. Under your organization name, click Teams.

    Teams tab

  4. On the Teams tab, click the name of the team. List of the organization's teams

  5. At the top of the team's page, click Security. Team security overview

  6. Optionally, filter the list of alerts. You can click multiple filters in the drop-down filter menus to narrow your search. You can also type search qualifiers in the Search repositories field. For more information about the available qualifiers, see "Filtering the list of alerts." The drop-down filter menus and Search repositories field in the security overview

Filtering the list of alerts

Filter by level of risk for repositories

The level of risk for a repository is determined by the number and severity of alerts from security features. If one or more security features are not enabled for a repository, the repository will have an unknown level of risk. If a repository has no risks that are detected by security features, the repository will have a clear level of risk.

QualifierDescription
risk:highDisplay repositories that are at high risk.
risk:mediumDisplay repositories that are at medium risk.
risk:lowDisplay repositories that are at low risk.
risk:unknownDisplay repositories that are at an unknown level of risk.
risk:clearDisplay repositories that have no detected level of risk.

Filter by number of alerts

QualifierDescription
code-scanning-alerts:nDisplay repositories that have n code scanning alerts. This qualifier can use > and < comparison operators.
secret-scanning-alerts:nDisplay repositories that have n secret scanning alerts. This qualifier can use > and < comparison operators.
dependabot-alerts:nDisplay repositories that have n Dependabot alerts. This qualifier can use > and < comparison operators.

Filter by whether security features are enabled

QualifierDescription
enabled:code-scanningDisplay repositories that have code scanning enabled.
not-enabled:code-scanningDisplay repositories that do not have code scanning enabled.
enabled:secret-scanningDisplay repositories that have secret scanning enabled.
not-enabled:secret-scanningDisplay repositories that have secret scanning enabled.
enabled:dependabot-alertsDisplay repositories that have Dependabot alerts enabled.
not-enabled:dependabot-alertsDisplay repositories that do not have Dependabot alerts enabled.

Filter by repository type

QualifierDescription
is:publicDisplay public repositories.
is:internalDisplay internal repositories.
is:privateDisplay private repositories.
archived:trueDisplay archived repositories.

Filter by team

QualifierDescription
team:TEAM-NAMEDisplays repositories that TEAM-NAME has admin privileges for.

Filter by topic

QualifierDescription
topic:TOPIC-NAMEDisplays repositories that are classified with TOPIC-NAME.

Sort the list of alerts

QualifierDescription
sort:riskSorts the repositories in your security overview by risk.
sort:reposSorts the repositories in your security overview alphabetically by name.
sort:code-scanning-alertsSorts the repositories in your security overview by number of code scanning alerts.
sort:secret-scanning-alertsSorts the repositories in your security overview by number of secret scanning alerts.
sort:dependabot-alertsSorts the repositories in your security overview by number of Dependabot alerts.

Did this doc help you?Privacy policy

Help us make these docs great!

All GitHub docs are open source. See something that's wrong or unclear? Submit a pull request.

Make a contribution

Or, learn how to contribute.