Skip to main content

Dependabot alert filters

Dependabot alerts filters help you prioritize and manage alerts for vulnerable dependencies in your repositories.

You can sort and filter Dependabot alerts by typing filters as key:value pairs into the search bar.

OptionDescriptionExample
artifact-registryDisplays alerts only for dependencies that have been promoted to production in the specified repository manager.artifact-registry:jfrog-artifactory will show any alerts alerts for dependencies that have been promoted to production in JFrog Artifactory.
artifact-registry-urlDisplays alerts related to artifacts present in a production-approved registry URL.artifact-registry-url:my-registry.example.com will show any alerts for vulnerabilities affecting artifacts stored in the my-registry.example.com registry URL.
CVE-IDDisplays alerts associated with this CVE-IDCVE-2020-28482 will show any alerts whose underlying advisory has this CVE ID number.
ecosystemDisplays alerts for the selected ecosystemUse ecosystem:npm to show Dependabot alerts for npm
GHSA-IDDisplays alerts associated with this GHSA-IDGHSA-49wp-qq6x-g2rf will show any alerts whose underlying advisory has this GitHub Advisory Database ID.
hasDisplays alerts meeting the selected filter criteriaUse has:patch to show alerts related to advisories that have a patch
isDisplays alerts based on their stateUse is:open to show open alerts
manifestDisplays alerts for the selected manifestUse manifest:webwolf/pom.xml to show alerts on the pom.xml file of the webwolf application
packageDisplays alerts for the selected packageUse package:django to show alerts for django
relationshipDisplays alerts of the selected relationship status
Note that this filter is only available for ecosystems with transitive support.
Use relationship:direct to show alerts for direct dependencies (marked with the Direct label).
resolutionDisplays alerts of the selected resolution statusUse resolution:no-bandwidth to show alerts previously parked due to lack of resources or time to fix them
repoDisplays alerts based on the repository they relate to
Note that this filter is only available for security overview. For more information, see About security overview
Use repo:octocat-repo to show alerts in the repository called octocat-repo
scopeDisplays alerts based on the scope of the dependency they relate toUse scope:development to show alerts for dependencies that are only used during development
severityDisplays alerts based on their level of severityUse severity:high to show alerts with a severity of High
epss_percentageDisplays alerts based on their EPSS-predicted probability of exploitationUse epss_percentage:>0.01 to see alerts with an EPSS percentage greater than 1%
sortDisplays alerts according to the selected sort orderThe default sorting option for alerts is sort:most-important, which ranks alerts by importance
Use sort:newest to show the latest alerts reported by Dependabot
Use sort:epss-percentage to show alerts ordered by descending EPSS score.
teamDisplay data for all repositories that the specified team has write access or admin access to. For more information on repository roles, see Repository roles for an organization.Use team:octo-team to show alerts for repositories that the octo-team team has write access to.
topicDisplay data for all repositories that are classified with a specific topic. For more information on repository topics, see Classifying your repository with topics.Use topic:nextjs to show alerts for repositories that are classified with the nextjs topic.

참고 항목

The Exploit Prediction Scoring System, or EPSS, provides a score (from 0 to 100%) or probability of the vulnerability to be exploited in the next 30 days, and a percentile (nth percentile) or relative measure of threat. This score comes from the Forum of Incident Response and Security Teams (FIRST) and is updated daily. To learn more, see Exploit Prediction Scoring System in the FIRST documentation.