Where in the repository can you give additional users access to secret scanning alerts?
How would you build your code within the CodeQL analysis workflow? (Each answer presents a complete solution. Choose two.)
Assuming security and analysis features are not configured at the repository, organization, or enterprise level, secret scanning is enabled on:
What step is required to run a SARIF-compatible (Static Analysis Results Interchange Format) tool on GitHub Actions?
After investigating a code scanning alert related to injection, you determine that the input is properly sanitized using custom logic. What should be your next step?
Assuming that no custom Dependabot behavior is configured, who has the ability to merge a pull request created via Dependabot security updates?
You are managing code scanning alerts for your repository. You receive an alert highlighting a problem with data flow. What do you click for additional context on the alert?
Where can you use CodeQL analysis for code scanning? (Each answer presents part of the solution. Choose two.)
Which of the following is the most complete method for Dependabot to find vulnerabilities in third-party dependencies?
Which of the following steps should you follow to integrate CodeQL into a third-party continuous integration system? (Each answer presents part of the solution. Choose three.)
You have enabled security updates for a repository. When does GitHub mark a Dependabot alert as resolved for that repository?
As a contributor, you discovered a vulnerability in a repository. Where should you look for the instructions on how to report the vulnerability?
In a private repository, what minimum requirements does GitHub need to generate a dependency graph? (Each answer presents part of the solution. Choose two.)