When reviewing code security configurations, you can now more easily filter repositories with new filter options.
The new filters allow you to sort repositories based on the status of specific features or GHAS itself:
- advanced-security:enabled
- dependabot-alerts:enabled
- dependabot-security-updates:enabled
- code-scanning-alerts:enabled
- code-scanning-default-setup:enabled
- code-scanning-pull-request-alerts:enabled
- secret-scanning-alerts:enabled
- secret-scanning-push-protection:enabled
Note that :disabled also works for each of the filters above to achieve the inverse.
Additionally, you can filter based on whether or not a repository is eligible for code scanning default setup:
– code-scanning-default-setup:eligible
– code-scanning-default-setup:not-eligible
These filters are available for organizations with GitHub Advanced Security (GHAS) enabled, and are only available in the UI at this time.
Learn more about code security configurations and send us your feedback.