fix(integration-platform): fail Dependabot check on open high/critical alerts#2643
Merged
fix(integration-platform): fail Dependabot check on open high/critical alerts#2643
Conversation
…l alerts The GitHub "Dependabot Security Updates Enabled" check previously passed whenever Dependabot was enabled on a repo, even when open high- or critical-severity alerts were waiting — hiding a real compliance risk behind a green checkmark. It now: - Accepts an `alert_severity_threshold` variable (default: `high`) so CX can configure what counts as a failure per connection. - Fails the check for the repo when open alerts at or above the threshold exist, using the highest actual severity present as the finding severity, and pointing the user at the repo's /security/dependabot page for remediation. - Preserves the transparent fallback when alert data cannot be fetched (e.g. 403) — no alert signal means no pass/fail regression. Severity helpers split into `dependabot-alert-severity.ts` for focused unit testing; the main check stays a single-responsibility orchestrator.
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
3 tasks
claudfuen
pushed a commit
that referenced
this pull request
Apr 23, 2026
# [3.30.0](v3.29.0...v3.30.0) (2026-04-23) ### Bug Fixes * **app:** show evidence block for failed automation runs ([975b4c9](975b4c9)), closes [#2643](#2643) * **integration-platform:** fail Dependabot check on open high/critical alerts ([b4492d1](b4492d1)) ### Features * **device-agent:** relax screen lock threshold to 15 minutes ([b20ced0](b20ced0)) ### Performance Improvements * **onboarding:** replace sequential update loops with bulk SQL in org init ([0c5d332](0c5d332))
Contributor
|
🎉 This PR is included in version 3.30.0 🎉 The release is available on GitHub release Your semantic-release bot 📦🚀 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Fixes a bug where the GitHub Dependabot Security Updates Enabled automation (evidence for the Secure Code task) would return Passed even when the repo had open high- or critical-severity Dependabot alerts. Reported with a screenshot showing 8 open high alerts + 21 medium yet a green checkmark.
Test plan
Behaviour change (customer-visible)
Automations that were passing with the default settings will now fail if the connected repos have open high/critical Dependabot alerts. This is intentional — it was the bug. CX should expect incoming questions from customers who see a previously-passing check flip red. The remediation text in the fail message walks them through merging the auto-generated Dependabot fix PRs or dismissing alerts with justification.
Customers who want the old "pass on enabled" behaviour can set the new variable to `critical` (fails on critical only) or switch to a lower threshold if they want stricter gating.
🤖 Generated with Claude Code
Summary by cubic
Fixes the GitHub Dependabot check to fail when a repo has open alerts at/above a configurable severity threshold. This may flip some green checks to red; set
alert_severity_thresholdtocriticalto keep the old behavior.Bug Fixes
enabledorpausedrepos, fail if open alerts meet the threshold; severity reflects the highest alert, and the remediation links to/security/dependabot.New Features
alert_severity_threshold(defaulthigh) to gate oncritical,high,medium, orlow.Written for commit b4492d1. Summary will update on new commits.