You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .github/agents/readability-editor.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,6 +36,7 @@ You are an expert editor for the GitHub Docs content team. Your job is to maximi
36
36
- When two possible phrasings are equally clear, choose the one with fewer words. Brevity directly improves readability.
37
37
- Use full terms and not their shortened versions.
38
38
- Use active voice and personal pronouns ("you," "your"); favor present tense.
39
+
- When “you can” introduces an instruction and does not convey optionality or permission, replace it with an active verb. For example, “You can enable” becomes “Enable”. Keep “you can” or add “optionally”/“if you want” when you need to express choice or permission.
39
40
- Retain essential technical details, such as defaults, warnings, and admin options.
40
41
- Do not alter the intent of verbs and actions (ex. "navigate" does not necessarily mean "select").
41
42
- Start at least half of steps or instructions with a direct verb, unless another structure improves clarity.
Copy file name to clipboardExpand all lines: content/actions/how-tos/manage-runners/larger-runners/control-access.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ Runner groups are used to control which repositories can run jobs on your {% dat
27
27
***Runners at the enterprise level:** {% data reusables.actions.about-enterprise-level-runner-groups %}
28
28
***Runners at the organization level:** {% data reusables.actions.about-organization-level-runner-groups %}
29
29
30
-
For example, the following diagram has a runner group named `grp-ubuntu-20.04-16core` at the enterprise level. Before the repository named `octo-repo` can use the runners in the group, you must first configure the group at the enterprise level to allow access to the `octo-org` organization. You must then configure the group at the organization level to allow access to `octo-repo`.
30
+
For example, the following diagram has a runner group named `grp-ubuntu-24.04-16core` at the enterprise level. Before the repository named `octo-repo` can use the runners in the group, you must first configure the group at the enterprise level to allow access to the `octo-org` organization. You must then configure the group at the organization level to allow access to `octo-repo`.
31
31
32
32

Copy file name to clipboardExpand all lines: content/actions/reference/runners/github-hosted-runners.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,6 +50,9 @@ Single-CPU {% data variables.product.github %}-hosted runners are available in b
50
50
51
51
`ubuntu-slim` runners execute Actions workflows in Ubuntu Linux, inside a container rather than a full VM instance. When the job begins, {% data variables.product.github %} automatically provisions a new container for that job. All steps in the job execute in the container, allowing the steps in that job to share information using the runner's file system. When the job has finished, the container is automatically decommissioned. Each container provides hypervisor level 2 isolation.
52
52
53
+
> [!NOTE]
54
+
> The container for `ubuntu-slim` runners runs in unprivileged mode. This means that some operations requiring elevated privileges—such as mounting file systems, using Docker-in-Docker, or accessing low-level kernel features—are not supported.
55
+
53
56
A minimal set of tools is installed on the `ubuntu-slim` runner image, appropriate for lightweight tasks. For details on what software is installed on the `ubuntu-slim` image, see the [README file](https://github.com/actions/runner-images/blob/main/images/ubuntu-slim/ubuntu-slim-Readme.md) in the `actions/runner-images` repository.
Copy file name to clipboardExpand all lines: content/admin/managing-accounts-and-repositories/managing-organizations-in-your-enterprise/removing-organizations-from-your-enterprise.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,6 +14,12 @@ redirect_from:
14
14
15
15
You can remove an organization that is owned by your enterprise account, so the organization stands alone.
16
16
17
+
## Limitations
18
+
19
+
If you use {% data variables.product.prodname_emus %} or {% data variables.enterprise.data_residency %}, removing organizations from your enterprise is not possible.
20
+
21
+
If you use {% data variables.product.prodname_emus %}, you can instead migrate organizations with the {% data variables.product.prodname_importer_proper_name %}. See [AUTOTITLE](/migrations/using-github-enterprise-importer/migrating-between-github-products/about-migrations-between-github-products).
22
+
17
23
## What happens when an organization is removed?
18
24
19
25
When you remove an organization from your enterprise:
## Preservation of default settings for new repositories
93
+
94
+
If you had default security settings in place for newly created repositories, {% data variables.product.github %} will preserve these settings by automatically creating a "New repository default settings" {% data variables.product.prodname_security_configuration %} for your enterprise. The configuration matches your previous enterprise-level default settings for new repositories as of December 2024.
95
+
96
+
The configuration will be automatically applied to any newly created repositories in your enterprise that do not belong to an organization with its own default settings.
Copy file name to clipboardExpand all lines: content/code-security/concepts/vulnerability-reporting-and-management/about-coordinated-disclosure-of-security-vulnerabilities.md
+9-4Lines changed: 9 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,11 +84,16 @@ Private vulnerability reporting provides a secure, structured way for security r
84
84
85
85
Without clear guidance on how to contact maintainers, security researchers may feel forced to disclose vulnerabilities publicly, such as by posting on social media, opening public issues, or contacting maintainers through informal channels, which can expose users to unnecessary risk. Private vulnerability reporting helps avoid these situations by offering a dedicated, private reporting workflow.
86
86
87
-
For security researchers, private vulnerability reporting offers:
87
+
For security researchers, the benefits of using private vulnerability reporting are:
88
88
89
-
* Less frustration, and less time spent trying to figure out how to contact the maintainer.
90
-
* A smoother process for disclosing and discussing vulnerability details.
91
-
* The opportunity to discuss vulnerability details privately with the repository maintainer.
89
+
* A clear, structured way to contact maintainers
90
+
* A smoother process for disclosing and discussing vulnerability details
91
+
* The ability to discuss vulnerability details privately with the repository maintainer
92
+
* Reduced risk of vulnerability details being in the public eye before a fix is available
93
+
94
+
For maintainers, the benefits of using private vulnerability reporting are:
95
+
96
+
{% data reusables.security-advisory.private-vulnerability-reporting-benefits %}
92
97
93
98
For more information for security researchers and repository maintainers, see [AUTOTITLE](/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/privately-reporting-a-security-vulnerability) and [AUTOTITLE](/code-security/security-advisories/guidance-on-reporting-and-writing-information-about-vulnerabilities/managing-privately-reported-security-vulnerabilities), respectively.
Copy file name to clipboardExpand all lines: content/code-security/concepts/vulnerability-reporting-and-management/about-the-github-advisory-database.md
+12-5Lines changed: 12 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ redirect_from:
23
23
24
24
Security advisories are published as JSON files in the Open Source Vulnerability (OSV) format. For more information about the OSV format, see [Open Source Vulnerability format](https://ossf.github.io/osv-schema/).
25
25
26
-
## About types of security advisories
26
+
## Types of security advisories
27
27
28
28
Each advisory in the {% data variables.product.prodname_advisory_database %} is for a vulnerability in open source projects or for malicious open source software.
29
29
@@ -68,11 +68,11 @@ If you enable {% data variables.product.prodname_dependabot_alerts %} for your r
68
68
69
69
Our malware advisories are mostly about substitution attacks. During this type of attack, an attacker publishes a package to the public registry with the same name as a dependency that users rely on from a third party or private registry, with the hope that the malicious version is consumed. {% data variables.product.prodname_dependabot %} doesn’t look at project configurations to determine if the packages are coming from a private registry, so we aren't sure if you're using the malicious version or a non-malicious version. Users who have their dependencies appropriately scoped should not be affected by malware.
70
70
71
-
## About information in security advisories
71
+
## Information in security advisories
72
72
73
73
In this section, you can find more detailed information about specific data attributes of the {% data variables.product.prodname_advisory_database %}.
74
74
75
-
### About GHSA IDs
75
+
### GHSA IDs
76
76
77
77
Each security advisory, regardless of its type, has a unique identifier referred to as a GHSA ID. A `GHSA-ID` qualifier is assigned when a new advisory is created on {% data variables.product.prodname_dotcom %} or added to the {% data variables.product.prodname_advisory_database %} from any of the supported sources.
78
78
@@ -89,7 +89,7 @@ You can validate a GHSA ID using a regular expression.
89
89
/GHSA(-[23456789cfghjmpqrvwx]{4}){3}/
90
90
```
91
91
92
-
### About CVSS levels
92
+
### CVSS levels
93
93
94
94
{% ifversion cvss-4 %} The {% data variables.product.prodname_advisory_database %} supports both CVSS version 3.1 and CVSS version 4.0.{% endif %}
95
95
@@ -105,7 +105,7 @@ The {% data variables.product.prodname_advisory_database %} uses the CVSS levels
105
105
106
106
{% data reusables.repositories.github-security-lab %}
107
107
108
-
### About EPSS scores
108
+
### EPSS scores
109
109
110
110
The Exploit Prediction Scoring System, or EPSS, is a system devised by the global Forum of Incident Response and Security Teams (FIRST) for quantifying the likelihood of vulnerability exploit. The model produces a probability score between 0 and 1 (0 and 100%), where the higher the score, the greater the probability that a vulnerability will be exploited. For more information about FIRST, see https://www.first.org/.
111
111
@@ -124,6 +124,13 @@ FIRST also provides additional information around the distribution of their EPSS
124
124
125
125
At {% data variables.product.company_short %}, we do not author this data, but rather source it from FIRST, which means that this data is not editable in community contributions. For more information about community contributions, see [AUTOTITLE](/code-security/security-advisories/working-with-global-security-advisories-from-the-github-advisory-database/editing-security-advisories-in-the-github-advisory-database).
126
126
127
+
## Community contributions
128
+
129
+
A **community contribution** is a pull request submitted to the [`github/advisory-database`](https://github.com/github/advisory-database) repository that improves the content of a global security advisory. When you make a community contribution, you can edit or add any detail, including additional affected ecosystems, the severity level, or the description of who is impacted. The {% data variables.product.prodname_security %} curation team will review the submitted contributions and publish them onto the {% data variables.product.prodname_advisory_database %} if accepted.
130
+
131
+
{% ifversion security-advisories-credit-types %}
132
+
If we accept and publish the community contribution, the person who submitted the community contribution pull request will automatically be assigned a credit type of "Analyst". For more information, see [AUTOTITLE](/code-security/security-advisories/working-with-repository-security-advisories/creating-a-repository-security-advisory#about-credits-for-repository-security-advisories).{% endif %}
0 commit comments