Skip to content

Commit 3cda4de

Browse files
isaacmbrownCopilot
andauthored
[EDI] Dependabot "low impact" preset rule (#59729)
Co-authored-by: Copilot Autofix powered by AI <175728472+Copilot@users.noreply.github.com>
1 parent d068abd commit 3cda4de

File tree

5 files changed

+71
-57
lines changed

5 files changed

+71
-57
lines changed

content/code-security/concepts/supply-chain-security/about-dependabot-auto-triage-rules.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: About Dependabot auto-triage rules
3-
intro: '{% data variables.dependabot.auto_triage_rules %} are a powerful tool to help you better manage your security alerts at scale. {% data variables.dependabot.github_presets %} are rules curated by {% data variables.product.company_short %} that you can use to filter out a substantial amount of false positives. {% data variables.dependabot.custom_rules_caps %} provide control over which alerts are ignored, snoozed, or trigger a {% data variables.product.prodname_dependabot %} security update to resolve the alert.'
3+
intro: 'Control how {% data variables.product.prodname_dependabot %} handles security alerts, including filtering, ignoring, snoozing, or triggering security updates.'
44
product: '{% data reusables.gated-features.dependabot-auto-triage-rules %}'
55
versions:
66
fpt: '*'
@@ -35,9 +35,18 @@ There are two types of {% data variables.dependabot.auto_triage_rules %}:
3535
> [!NOTE]
3636
> {% data reusables.dependabot.dependabot-github-preset-auto-triage-rules %}
3737
38-
{% data variables.dependabot.github_presets %} are rules curated by {% data variables.product.company_short %}. {% data reusables.dependabot.dismiss-low-impact-rule %}
38+
{% data variables.dependabot.github_presets %} are rules curated by {% data variables.product.company_short %}.
3939

40-
The rule is enabled by default for public repositories and can be opted into for private repositories. You can enable the rule for a private repository via the **Settings** tab for the repository. For more information, see [Enabling the `Dismiss low impact issues for development-scoped dependencies` rule for your private repository](/code-security/dependabot/dependabot-auto-triage-rules/using-github-preset-rules-to-prioritize-dependabot-alerts#enabling-the-dismiss-low-impact-issues-for-development-scoped-dependencies-rule-for-your-private-repository).
40+
{% data reusables.dependabot.dismiss-low-impact-rule %} These alerts cover cases that feel like false alarms to most developers as the associated vulnerabilities:
41+
42+
* Are unlikely to be exploitable in a developer (non-production or runtime) environment.
43+
* May relate to resource management, programming and logic, and information disclosure issues.
44+
* At worst, have limited effects like slow builds or long-running tests.
45+
* Are not indicative of issues in production.
46+
47+
The rule is enabled by default for public repositories and can be opted into for private repositories. For instructions, see [Enabling the `Dismiss low impact issues for development-scoped dependencies` rule for your private repository](/code-security/dependabot/dependabot-auto-triage-rules/using-github-preset-rules-to-prioritize-dependabot-alerts#enabling-the-dismiss-low-impact-issues-for-development-scoped-dependencies-rule-for-your-private-repository).
48+
49+
For more information about the criteria used by the rule, see [AUTOTITLE](/code-security/reference/supply-chain-security/criteria-for-preset-rules).
4150

4251
### About {% data variables.dependabot.custom_rules %}
4352

Lines changed: 3 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Using GitHub preset rules to prioritize Dependabot alerts
3-
intro: You can use {% data variables.dependabot.github_presets %}, which are rules curated by {% data variables.product.company_short %}, to auto-dismiss low impact development alerts for npm dependencies.
3+
intro: Focus on alerts that matter by auto-dismissing low impact development alerts for npm dependencies.
44
permissions: '{% data reusables.permissions.dependabot-github-presets %}'
55
versions:
66
fpt: '*'
@@ -20,23 +20,9 @@ redirect_from:
2020
contentType: how-tos
2121
---
2222

23-
## About {% data variables.dependabot.github_presets %}
23+
{% data reusables.dependabot.dismiss-low-impact-rule %} For more information about the rule, see [AUTOTITLE](/code-security/concepts/supply-chain-security/about-dependabot-auto-triage-rules#about-github-presets).
2424

25-
The `Dismiss low impact issues for development-scoped dependencies` rule is a {% data variables.product.company_short %} preset that auto-dismisses certain types of vulnerabilities that are found in npm dependencies used in development. These alerts cover cases that feel like false alarms to most developers as the associated vulnerabilities:
26-
27-
* Are unlikely to be exploitable in a developer (non-production or runtime) environment.
28-
* May relate to resource management, programming and logic, and information disclosure issues.
29-
* At worst, have limited effects like slow builds or long-running tests.
30-
* Are not indicative of issues in production.
31-
32-
> [!NOTE]
33-
> Automatic dismissal of low impact development alerts is currently only supported for npm.
34-
35-
The `Dismiss low impact issues for development-scoped dependencies` rule includes vulnerabilities relating to resource management, programming and logic, and information disclosure issues. For more information, see [Publicly disclosed CWEs used by the `Dismiss low impact issues for development-scoped dependencies` rule](#publicly-disclosed-cwes-used-by-the-dismiss-low-impact-issues-for-development-scoped-dependencies-rule).
36-
37-
Filtering out these low impact alerts allows you to focus on alerts that matter to you, without having to worry about missing potentially high-risk development-scoped alerts.
38-
39-
The `Dismiss low impact issues for development-scoped dependencies` rule is enabled by default on public repositories and disabled for private repositories. Administrators of private repositories can opt in by enabling the rule for their repository.
25+
This rule is enabled by default on public repositories and disabled for private repositories. Administrators of private repositories can opt in by enabling the rule for their repository.
4026

4127
## Enabling the `Dismiss low impact issues for development-scoped dependencies` rule for your private repository
4228

@@ -52,39 +38,3 @@ The `Dismiss low impact issues for development-scoped dependencies` rule is enab
5238
1. Under "{% data variables.product.company_short %} presets", to the right of "Dismiss low impact issues for development-scoped dependencies", click {% octicon "pencil" aria-label="Edit rule" %}.
5339
1. Under "State", select the dropdown menu, then click "Enabled".
5440
1. Click **Save rule**.
55-
56-
## Publicly disclosed CWEs used by the `Dismiss low impact issues for development-scoped dependencies` rule
57-
58-
Along with the `ecosystem:npm` and `scope:development` alert metadata, we use the following {% data variables.product.company_short %}-curated Common Weakness Enumerations (CWEs) to filter out low impact alerts for the `Dismiss low impact issues for development-scoped dependencies` rule. We regularly improve this list and vulnerability patterns covered by built-in rules.
59-
60-
### Resource Management Issues
61-
62-
* CWE-400 Uncontrolled Resource Consumption
63-
* CWE-770 Allocation of Resources Without Limits or Throttling
64-
* CWE-409 Improper Handling of Highly Compressed Data (Data Amplification)
65-
* CWE-908 Use of Uninitialized Resource
66-
* CWE-1333 Inefficient Regular Expression Complexity
67-
* CWE-835 Loop with Unreachable Exit Condition ('Infinite Loop')
68-
* CWE-674 Uncontrolled Recursion
69-
* CWE-1119 Excessive Use of Unconditional Branching
70-
71-
### Programming and Logic Errors
72-
73-
* CWE-185 Incorrect Regular Expression
74-
* CWE-754 Improper Check for Unusual or Exceptional Conditions
75-
* CWE-755 Improper Handling of Exceptional Conditions
76-
* CWE-248 Uncaught Exception
77-
* CWE-252 Unchecked Return Value
78-
* CWE-391 Unchecked Error Condition
79-
* CWE-696 Incorrect Behavior Order
80-
* CWE-1254 Incorrect Comparison Logic Granularity
81-
* CWE-665 Improper Initialization
82-
* CWE-703 Improper Check or Handling of Exceptional Conditions
83-
* CWE-178 Improper Handling of Case Sensitivity
84-
85-
### Information Disclosure Issues
86-
87-
* CWE-544 Missing Standardized Error Handling Mechanism
88-
* CWE-377 Insecure Temporary File
89-
* CWE-451 User Interface (UI) Misrepresentation of Critical Information
90-
* CWE-668 Exposure of Resource to Wrong Sphere
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
---
2+
title: CWEs used by GitHub's preset Dependabot rules
3+
intro: '{% data variables.product.github %} uses industry-standard criteria to help you filter {% data variables.product.prodname_dependabot_alerts %}.'
4+
versions:
5+
fpt: '*'
6+
ghec: '*'
7+
ghes: '*'
8+
topics:
9+
- Dependabot
10+
- Version updates
11+
- Repositories
12+
- Dependencies
13+
- Pull requests
14+
shortTitle: Criteria for preset rules
15+
contentType: reference
16+
---
17+
18+
## `Dismiss low impact issues for development-scoped dependencies`
19+
20+
{% data reusables.dependabot.dismiss-low-impact-rule %}
21+
22+
Along with the `ecosystem:npm` and `scope:development` alert metadata, we use the following {% data variables.product.company_short %}-curated Common Weakness Enumerations (CWEs) to filter out low impact alerts for the `Dismiss low impact issues for development-scoped dependencies` rule. We regularly improve this list and vulnerability patterns covered by built-in rules.
23+
24+
### Resource Management Issues
25+
26+
* CWE-400 Uncontrolled Resource Consumption
27+
* CWE-770 Allocation of Resources Without Limits or Throttling
28+
* CWE-409 Improper Handling of Highly Compressed Data (Data Amplification)
29+
* CWE-908 Use of Uninitialized Resource
30+
* CWE-1333 Inefficient Regular Expression Complexity
31+
* CWE-835 Loop with Unreachable Exit Condition ('Infinite Loop')
32+
* CWE-674 Uncontrolled Recursion
33+
* CWE-1119 Excessive Use of Unconditional Branching
34+
35+
### Programming and Logic Errors
36+
37+
* CWE-185 Incorrect Regular Expression
38+
* CWE-754 Improper Check for Unusual or Exceptional Conditions
39+
* CWE-755 Improper Handling of Exceptional Conditions
40+
* CWE-248 Uncaught Exception
41+
* CWE-252 Unchecked Return Value
42+
* CWE-391 Unchecked Error Condition
43+
* CWE-696 Incorrect Behavior Order
44+
* CWE-1254 Incorrect Comparison Logic Granularity
45+
* CWE-665 Improper Initialization
46+
* CWE-703 Improper Check or Handling of Exceptional Conditions
47+
* CWE-178 Improper Handling of Case Sensitivity
48+
49+
### Information Disclosure Issues
50+
51+
* CWE-544 Missing Standardized Error Handling Mechanism
52+
* CWE-377 Insecure Temporary File
53+
* CWE-451 User Interface (UI) Misrepresentation of Critical Information
54+
* CWE-668 Exposure of Resource to Wrong Sphere

content/code-security/reference/supply-chain-security/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,7 @@ children:
2525
- /dependabot-security-updates
2626
- /dependency-graph-supported-package-ecosystems
2727
- /dependabot-on-actions
28+
- /criteria-for-preset-rules
2829
- /troubleshoot-dependabot
2930
redirect_from:
3031
- /code-security/dependabot/ecosystems-supported-by-dependabot
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
The `Dismiss low impact issues for development-scoped dependencies` is a {% data variables.product.company_short %} preset rule. This rule auto-dismisses certain types of vulnerabilities that are found in npm dependencies used in development. The rule has been curated to reduce false positives and reduce alert fatigue. You cannot modify {% data variables.dependabot.github_presets %}. For more information about {% data variables.dependabot.github_presets %}, see [AUTOTITLE](/code-security/dependabot/dependabot-auto-triage-rules/using-github-preset-rules-to-prioritize-dependabot-alerts).
1+
The `Dismiss low impact issues for development-scoped dependencies` rule is a {% data variables.product.company_short %} preset that auto-dismisses certain types of vulnerabilities that are found in npm dependencies used in development.

0 commit comments

Comments
 (0)