{"payload":{"contentfulRawJsonResponse":{"sys":{"type":"Array"},"total":1,"skip":0,"limit":100,"items":[{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"598E6c3BHs6952WxhEzSUX","type":"Entry","createdAt":"2024-05-09T17:57:59.154Z","updatedAt":"2024-06-07T12:20:41.997Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":8,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"containerPage"}},"locale":"en-US"},"fields":{"title":"Features · Security · Software Supply Chain","path":"/features/security/software-supply-chain","template":{"sys":{"type":"Link","linkType":"Entry","id":"3f0wc8EKDytm0cEAi8S8Oo"}},"settings":{"sys":{"type":"Link","linkType":"Entry","id":"6h3tW7FRUXoPDzn5MRCxGK"}},"seo":{"sys":{"type":"Link","linkType":"Entry","id":"5rnD4thX4dZ0kqCULkoSer"}}}}],"includes":{"Entry":[{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"01FcX42OF3JR0ezNKLuf7j","type":"Entry","createdAt":"2024-05-09T17:57:59.512Z","updatedAt":"2024-06-07T16:03:23.792Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Security","href":"https://github.com/features/security","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"1Cq8Ul6hkGHG4wCnald2JL","type":"Entry","createdAt":"2024-05-31T18:28:18.502Z","updatedAt":"2024-06-03T12:43:22.586Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Learn more","href":"https://docs.github.com/free-pro-team@latest/github/collaborating-with-issues-and-pull-requests/reviewing-dependency-changes-in-a-pull-request","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"1DEiWWv4mhO6i99psrJVU6","type":"Entry","createdAt":"2024-05-09T17:58:00.512Z","updatedAt":"2024-05-09T17:58:00.512Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentCard"}},"locale":"en-US"},"fields":{"title":"Avoid AppSec pitfalls","href":"https://resources.github.com/whitepapers/Three-AppSec-pitfalls-security/","heading":"Avoid AppSec pitfalls","description":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Explore common application security pitfalls and how to avoid them.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"iconBackground":false,"iconColor":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2Jjknbcy2HpsAuXPFGinyT","type":"Entry","createdAt":"2024-05-09T17:58:00.421Z","updatedAt":"2024-05-09T17:58:00.421Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentCard"}},"locale":"en-US"},"fields":{"title":"The government agency's guide to DevSecOps","href":"https://resources.github.com/whitepapers/DevSecOps-government-agency-guide/","heading":"The government agency's guide to DevSecOps","description":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Learn how to write more secure code from the start with DevSecOps.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"iconBackground":false,"iconColor":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2PJjJkRXtrIPSC7yiT01TL","type":"Entry","createdAt":"2024-05-09T17:57:59.618Z","updatedAt":"2024-06-07T19:44:35.711Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":6,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Supply chain","href":"https://github.com/features/security/software-supply-chain","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2SBVsZ7BxEkcyWZ1ex1GWB","type":"Entry","createdAt":"2024-05-31T18:28:18.529Z","updatedAt":"2024-06-03T12:39:00.886Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentPillar"}},"locale":"en-US"},"fields":{"title":"/features/security/software-supply-chain Pillar - Prevent","align":"center","icon":"package","heading":"Prevent","description":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Keep the packages you use updated to the latest versions","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"link":{"sys":{"type":"Link","linkType":"Entry","id":"4vLt2zbARn9EHdOZFy9mSi"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2Z5iEHQF6h1SZRlPaHmeIa","type":"Entry","createdAt":"2024-05-09T17:57:59.857Z","updatedAt":"2024-05-09T17:57:59.857Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Contact sales","href":"https://github.com/enterprise/contact?ref_cta=Contact+Sales&ref_loc=hero&ref_page=%2Ffeatures%2Fsecurity%2Fsoftware-supply-chain&scid=&utm_campaign=adv-security&utm_content=Security&utm_medium=site&utm_source=github","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"2c8tmTfvbeIuSEydwtmyt3","type":"Entry","createdAt":"2024-05-09T17:57:59.735Z","updatedAt":"2024-06-03T12:32:18.166Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentHero"}},"locale":"en-US"},"fields":{"title":"/features/security/software-supply-chain Hero","align":"start","label":"GitHub Security","heading":"Secure your software supply chain","imagePosition":"Block","description":"Avoid adding new vulnerabilities with dependency review. Your software is more than the code you have written. With up to 94% of active repositories relying on open source, you rely on many components you didn’t produce, but which you still need to secure.","callToActionPrimary":{"sys":{"type":"Link","linkType":"Entry","id":"2Z5iEHQF6h1SZRlPaHmeIa"}},"callToActionSecondary":{"sys":{"type":"Link","linkType":"Entry","id":"6MPPlfhiu2QPcCkSOiWrhh"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"3BKfrfexsrYAcdzIlv3owQ","type":"Entry","createdAt":"2024-05-31T18:28:18.483Z","updatedAt":"2024-06-03T12:38:56.888Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentPillar"}},"locale":"en-US"},"fields":{"title":"/features/security/software-supply-chain Pillar - Fix vulnerabilities","align":"center","icon":"shield-check","heading":"Fix vulnerabilities","description":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Fix vulnerable dependencies by raising pull requests with security updates","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"link":{"sys":{"type":"Link","linkType":"Entry","id":"1Cq8Ul6hkGHG4wCnald2JL"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"3Et7zq6SSpOBzcSiEfZGh8","type":"Entry","createdAt":"2024-05-09T17:58:00.022Z","updatedAt":"2024-05-09T17:58:00.022Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"How GitHub’s dependency graph is generated","href":"https://docs.github.com/free-pro-team@latest/github/visualizing-repository-data-with-graphs/about-the-dependency-graph","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"3f0wc8EKDytm0cEAi8S8Oo","type":"Entry","createdAt":"2024-05-09T17:57:59.259Z","updatedAt":"2024-06-03T12:32:18.127Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":8,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"templateF2"}},"locale":"en-US"},"fields":{"title":"/features/security/software-supply-chain","subnav":{"sys":{"type":"Link","linkType":"Entry","id":"FCeyrNDZxYdhVivWnJbxQ"}},"hero":{"sys":{"type":"Link","linkType":"Entry","id":"2c8tmTfvbeIuSEydwtmyt3"}},"sectionIntro":{"sys":{"type":"Link","linkType":"Entry","id":"5O6BwUOZiLHS5C0p8tvbnJ"}},"pillars":[{"sys":{"type":"Link","linkType":"Entry","id":"3m3L22PXyFAQMANnlx9lbW"}},{"sys":{"type":"Link","linkType":"Entry","id":"3BKfrfexsrYAcdzIlv3owQ"}},{"sys":{"type":"Link","linkType":"Entry","id":"2SBVsZ7BxEkcyWZ1ex1GWB"}}],"rivers":[{"sys":{"type":"Link","linkType":"Entry","id":"6m3016nFrfB552naawzDVV"}},{"sys":{"type":"Link","linkType":"Entry","id":"TKwNCcHCOQ15c9iPxwVKB"}},{"sys":{"type":"Link","linkType":"Entry","id":"42q6t4xS0Tq06mbsorVOSo"}},{"sys":{"type":"Link","linkType":"Entry","id":"3kM5i1vWjK3XfwO4XLN0Mn"}}],"ctaBanner":{"sys":{"type":"Link","linkType":"Entry","id":"Sp9QzwcM4h3MoawtW9NVh"}},"cardsHeading":"Best practices for more secure software","cards":[{"sys":{"type":"Link","linkType":"Entry","id":"3w9wxVYj6FRK9HKo6q8x87"}},{"sys":{"type":"Link","linkType":"Entry","id":"2Jjknbcy2HpsAuXPFGinyT"}},{"sys":{"type":"Link","linkType":"Entry","id":"1DEiWWv4mhO6i99psrJVU6"}}]}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"3kM5i1vWjK3XfwO4XLN0Mn","type":"Entry","createdAt":"2024-05-09T17:58:00.304Z","updatedAt":"2024-06-03T12:32:18.253Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentRiver"}},"locale":"en-US"},"fields":{"title":"/features/security/software-supply-chain River - Get involved through GitHub Security Lab","align":"end","imageTextRatio":"50:50","heading":"Get involved through GitHub Security Lab","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Develop a private fix and publish an advisory about a vulnerability in your project, and share your reporting and disclosure policy with the world.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"callToAction":{"sys":{"type":"Link","linkType":"Entry","id":"4kiwSWEuFd4uXjA876sXnZ"}},"image":{"sys":{"type":"Link","linkType":"Asset","id":"1fUZu6b9JCj2sEJL8mVi8F"}},"hasShadow":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"3m3L22PXyFAQMANnlx9lbW","type":"Entry","createdAt":"2024-05-31T18:28:18.375Z","updatedAt":"2024-06-03T12:38:52.662Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentPillar"}},"locale":"en-US"},"fields":{"title":"/features/security/software-supply-chain Pillar - Review changes","align":"center","icon":"code-review","heading":"Review changes","description":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Review dependency changes in relevant context like pull requests and issues","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"link":{"sys":{"type":"Link","linkType":"Entry","id":"3n8nVqmhMmL3uYGZGeFn6S"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"3n8nVqmhMmL3uYGZGeFn6S","type":"Entry","createdAt":"2024-05-31T18:28:18.467Z","updatedAt":"2024-06-03T12:40:39.934Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Learn more","href":"https://docs.github.com/free-pro-team@latest/github/collaborating-with-issues-and-pull-requests/reviewing-dependency-changes-in-a-pull-request","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"3w9wxVYj6FRK9HKo6q8x87","type":"Entry","createdAt":"2024-05-09T17:58:00.359Z","updatedAt":"2024-05-09T17:58:00.359Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentCard"}},"locale":"en-US"},"fields":{"title":"Developer-first application security","href":"https://resources.github.com/security/supply-chain/shipping-fast-secure-supply-chain/","heading":"Developer-first application security","description":{"nodeType":"document","data":{},"content":[{"nodeType":"paragraph","data":{},"content":[{"nodeType":"text","value":"Take an in-depth look at the current state of application security.","marks":[],"data":{}}]}]},"iconBackground":false,"iconColor":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"42q6t4xS0Tq06mbsorVOSo","type":"Entry","createdAt":"2024-05-09T17:58:00.242Z","updatedAt":"2024-05-17T19:27:56.705Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentRiver"}},"locale":"en-US"},"fields":{"title":"/features/security/software-supply-chain River - Fix and publish vulnerability information","align":"start","imageTextRatio":"50:50","heading":"Fix and publish vulnerability information","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Review, fix and publish issues securely. Contribute and refer to a curated, open-source database of vulnerabilities.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"callToAction":{"sys":{"type":"Link","linkType":"Entry","id":"T4gqj6y5BFTD6g6QVpnSt"}},"image":{"sys":{"type":"Link","linkType":"Asset","id":"4iHneF2CxC1OTyFrYckQJd"}},"hasShadow":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4JooclxCqdAFRWOmkfC8Lx","type":"Entry","createdAt":"2024-05-09T17:57:59.718Z","updatedAt":"2024-06-07T12:22:09.244Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Code scanning","href":"https://github.com/features/security/code-scanning","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4kiwSWEuFd4uXjA876sXnZ","type":"Entry","createdAt":"2024-05-09T17:58:00.320Z","updatedAt":"2024-06-03T12:32:18.292Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Publish a repository security advisory","href":"https://securitylab.github.com/","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4vLt2zbARn9EHdOZFy9mSi","type":"Entry","createdAt":"2024-05-31T18:28:18.624Z","updatedAt":"2024-06-03T12:45:18.889Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Learn more","href":"https://docs.github.com/free-pro-team@latest/github/managing-security-vulnerabilities/about-dependabot-security-updates","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5O6BwUOZiLHS5C0p8tvbnJ","type":"Entry","createdAt":"2024-05-31T18:25:37.316Z","updatedAt":"2024-06-03T12:38:35.886Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentSectionIntro"}},"locale":"en-US"},"fields":{"title":"/features/security/software-supply-chain","align":"center","heading":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Get notified of new vulnerabilities","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"description":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Keep your dependencies up-to-date and optimized and get updates on new vulnerabilities affecting your specific dependencies with Dependabot.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"fullWidth":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5rhl5DGPWcXZX4V0IyKGkx","type":"Entry","createdAt":"2024-05-10T14:42:15.644Z","updatedAt":"2024-05-10T14:42:15.644Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Contact sales","href":"https://github.com/enterprise/contact?ref_cta=Contact+Sales&ref_loc=footer&ref_page=%2Ffeatures%2Fsecurity%2Fcode&scid=&utm_campaign=adv-security&utm_content=Security&utm_medium=site&utm_source=github","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5rnD4thX4dZ0kqCULkoSer","type":"Entry","createdAt":"2024-06-03T12:32:10.080Z","updatedAt":"2024-06-03T13:19:13.539Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSeo"}},"locale":"en-US"},"fields":{"title":"/features/security/software-supply-chain","description":"Secure your software supply chain","socialMediaImage":{"sys":{"type":"Link","linkType":"Asset","id":"5xAQSymDTgwIguWTyhlTTQ"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6MPPlfhiu2QPcCkSOiWrhh","type":"Entry","createdAt":"2024-05-17T15:31:08.915Z","updatedAt":"2024-05-17T15:31:08.915Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"Request a demo","href":"https://resources.github.com/demo/advanced-security/","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6h3tW7FRUXoPDzn5MRCxGK","type":"Entry","createdAt":"2024-05-09T17:58:00.531Z","updatedAt":"2024-06-07T12:20:38.958Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":4,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"pageSettings"}},"locale":"en-US"},"fields":{"title":"/features/security/software-supply-chain","colorMode":"light","globalNavbarStyle":"default"}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"6m3016nFrfB552naawzDVV","type":"Entry","createdAt":"2024-05-09T17:57:59.875Z","updatedAt":"2024-05-17T19:02:10.929Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":3,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentRiver"}},"locale":"en-US"},"fields":{"title":"/features/security/software-supply-chain River - Know what’s in your environment","align":"start","imageTextRatio":"50:50","heading":"Know what’s in your environment","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Identify your dependencies, dependents, and their properties to understand your software supply chain.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"image":{"sys":{"type":"Link","linkType":"Asset","id":"364RGtTXo2oNrfmEgW1I23"}},"hasShadow":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"FCeyrNDZxYdhVivWnJbxQ","type":"Entry","createdAt":"2024-05-09T17:57:59.287Z","updatedAt":"2024-06-07T16:03:52.426Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentSubnav"}},"locale":"en-US"},"fields":{"title":"/features/security","heading":{"sys":{"type":"Link","linkType":"Entry","id":"01FcX42OF3JR0ezNKLuf7j"}},"links":[{"sys":{"type":"Link","linkType":"Entry","id":"4JooclxCqdAFRWOmkfC8Lx"}},{"sys":{"type":"Link","linkType":"Entry","id":"2PJjJkRXtrIPSC7yiT01TL"}}]}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"Sp9QzwcM4h3MoawtW9NVh","type":"Entry","createdAt":"2024-05-09T17:58:00.341Z","updatedAt":"2024-06-03T12:32:18.541Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentCtaBanner"}},"locale":"en-US"},"fields":{"title":"/features/security/software-supply-chain CTA Banner","align":"center","heading":"Secure software from the start","description":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Whether you’re contributing to an open source project or choosing new tools for your team, your security needs are covered.","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"hasBackground":true,"hasShadow":false,"hasBorder":true,"callToActionPrimary":{"sys":{"type":"Link","linkType":"Entry","id":"5rhl5DGPWcXZX4V0IyKGkx"}},"callToActionSecondary":{"sys":{"type":"Link","linkType":"Entry","id":"6MPPlfhiu2QPcCkSOiWrhh"}}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"T4gqj6y5BFTD6g6QVpnSt","type":"Entry","createdAt":"2024-05-09T17:58:00.262Z","updatedAt":"2024-05-09T17:58:00.262Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"link"}},"locale":"en-US"},"fields":{"text":"GitHub Advisory Database","href":"https://github.com/advisories","openInNewTab":false}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"TKwNCcHCOQ15c9iPxwVKB","type":"Entry","createdAt":"2024-05-09T18:00:06.012Z","updatedAt":"2024-06-03T12:27:54.122Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":5,"contentType":{"sys":{"type":"Link","linkType":"ContentType","id":"primerComponentRiver"}},"locale":"en-US"},"fields":{"title":"/features/security/software-supply-chain River - Identify all your project's dependencies","align":"end","imageTextRatio":"50:50","heading":"Identify all your project's dependencies","text":{"data":{},"content":[{"data":{},"content":[{"data":{},"marks":[],"value":"Discover your dependencies using GitHub’s dependency graph, including transitive dependencies.","nodeType":"text"}],"nodeType":"paragraph"},{"data":{},"content":[{"data":{},"marks":[],"value":"","nodeType":"text"}],"nodeType":"paragraph"}],"nodeType":"document"},"callToAction":{"sys":{"type":"Link","linkType":"Entry","id":"3Et7zq6SSpOBzcSiEfZGh8"}},"image":{"sys":{"type":"Link","linkType":"Asset","id":"7eey8jaQz35jLotJgizcPO"}},"hasShadow":false}}],"Asset":[{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"1fUZu6b9JCj2sEJL8mVi8F","type":"Asset","createdAt":"2024-05-17T19:32:35.082Z","updatedAt":"2024-06-07T14:33:39.223Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"locale":"en-US"},"fields":{"title":"draft-security-policy","description":"Heading \"Open a draft security advisory\" displaying a form with fields","file":{"url":"//images.ctfassets.net/8aevphvgewt8/1fUZu6b9JCj2sEJL8mVi8F/3b5b3e39c2212aa876f23fb9c7ea34c6/draft-security-policy.webp","details":{"size":81344,"image":{"width":1200,"height":846}},"fileName":"draft-security-policy.webp","contentType":"image/webp"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"364RGtTXo2oNrfmEgW1I23","type":"Asset","createdAt":"2024-05-17T19:02:08.180Z","updatedAt":"2024-06-07T14:29:34.936Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":6,"locale":"en-US"},"fields":{"title":"dependency-graph","description":"List of dependencies defined in pypi/requirements.txt","file":{"url":"//images.ctfassets.net/8aevphvgewt8/364RGtTXo2oNrfmEgW1I23/794ff98a22d3472466fd1997cbc200dc/dependency-graph.webp","details":{"size":69712,"image":{"width":1200,"height":830}},"fileName":"dependency-graph.webp","contentType":"image/webp"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"4iHneF2CxC1OTyFrYckQJd","type":"Asset","createdAt":"2024-05-17T19:27:51.049Z","updatedAt":"2024-06-07T14:32:00.773Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":2,"locale":"en-US"},"fields":{"title":"advisory-database","description":"GitHub Advisory Database displaying 3,055 advisories total, displaying 5.","file":{"url":"//images.ctfassets.net/8aevphvgewt8/4iHneF2CxC1OTyFrYckQJd/7ccfe0660f2bc09a2cad7dbbac0d3458/advisory-database.webp","details":{"size":110926,"image":{"width":1200,"height":1074}},"fileName":"advisory-database.webp","contentType":"image/webp"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"5xAQSymDTgwIguWTyhlTTQ","type":"Asset","createdAt":"2024-06-03T13:19:11.459Z","updatedAt":"2024-06-03T13:19:11.459Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":1,"locale":"en-US"},"fields":{"title":"Supple chain SEO image","description":"Secure your software supply chain","file":{"url":"//images.ctfassets.net/8aevphvgewt8/5xAQSymDTgwIguWTyhlTTQ/04ff93f94fc624ba6470aeea51c40d65/security-supply-chain-ff79bcb13159.jpg","details":{"size":57661,"image":{"width":1200,"height":630}},"fileName":"security-supply-chain-ff79bcb13159.jpg","contentType":"image/jpeg"}}},{"metadata":{"tags":[]},"sys":{"space":{"sys":{"type":"Link","linkType":"Space","id":"8aevphvgewt8"}},"id":"7eey8jaQz35jLotJgizcPO","type":"Asset","createdAt":"2024-05-17T19:09:47.110Z","updatedAt":"2024-06-07T14:42:59.548Z","environment":{"sys":{"id":"master","type":"Link","linkType":"Environment"}},"revision":6,"locale":"en-US"},"fields":{"title":"Dependabot alert popup","description":"Popup displaying \"We found potential security vulnerabilities in your dependencies\" with button \"See Dependabot alerts\"","file":{"url":"//images.ctfassets.net/8aevphvgewt8/7eey8jaQz35jLotJgizcPO/dea58db43183e82785bb3e7ab1b33320/Frame_2__6_.webp","details":{"size":48378,"image":{"width":1200,"height":580}},"fileName":"Frame 2 (6).webp","contentType":"image/webp"}}}]}},"userLoggedIn":false},"title":"Features · Security · Software Supply Chain"}