Skip to content

Commit 5b0e6ca

Browse files
jclement136jc-clarkmchammer01
authored
[2026-03-31] Rename the Security tab to Security & quality [GA] (#60482)
Co-authored-by: Joe Clark <31087804+jc-clark@users.noreply.github.com> Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com>
1 parent 3f23fab commit 5b0e6ca

File tree

61 files changed

+79
-86
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

61 files changed

+79
-86
lines changed

content/code-security/concepts/about-code-quality.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ When {% data variables.product.prodname_codeql %} finds rule-based problems on p
6565

6666
### Default branch results
6767

68-
{% data variables.product.prodname_code_quality_short %} findings on the default branch are reported on "{% data variables.code-quality.code_quality_ui %}" pages on the **Security** tab for the repository:
68+
{% data variables.product.prodname_code_quality_short %} findings on the default branch are reported on "{% data variables.code-quality.code_quality_ui %}" pages on the **{% data variables.product.prodname_security_and_quality_tab %}** tab for the repository:
6969

7070
* **{% data variables.code-quality.all_findings %}** shows the results of {% data variables.product.prodname_codeql %} quality analysis. See [AUTOTITLE](/code-security/code-quality/tutorials/improve-your-codebase).
7171
* **{% data variables.code-quality.recent_suggestions %}** shows the results of AI-powered analysis of the files most recently pushed to the default branch. See [AUTOTITLE](/code-security/code-quality/tutorials/improve-recent-merges).

content/code-security/concepts/secret-security/about-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ For {% data variables.product.company_short %} to scan for non-provider patterns
7676

7777
## About push protection alerts
7878

79-
Push protection scans pushes for supported secrets. If push protection detects a supported secret, it will block the push. When a contributor bypasses push protection to push a secret to the repository, a push protection alert is generated and displayed in the **Security** tab of the repository. To see all push protection alerts for a repository, you must filter by `bypassed: true` on the alerts page. For more information, see [AUTOTITLE](/code-security/how-tos/manage-security-alerts/manage-secret-scanning-alerts/viewing-alerts#filtering-alerts).
79+
Push protection scans pushes for supported secrets. If push protection detects a supported secret, it will block the push. When a contributor bypasses push protection to push a secret to the repository, a push protection alert is generated and displayed in the **{% data variables.product.prodname_security_and_quality_tab %}** tab of the repository. To see all push protection alerts for a repository, you must filter by `bypassed: true` on the alerts page. For more information, see [AUTOTITLE](/code-security/how-tos/manage-security-alerts/manage-secret-scanning-alerts/viewing-alerts#filtering-alerts).
8080

8181
{% data reusables.secret-scanning.secret-scanning-pattern-pair-matches %}
8282

content/code-security/concepts/secret-security/about-push-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ You can enable push protection for repositories at the repository, organization,
4545
* Requires {% data variables.product.prodname_GH_secret_protection_always %} to be enabled
4646
* Is disabled by default, and can be enabled by a repository administrator, organization owner, security manager, or enterprise owner
4747
* Blocks pushes containing secrets from reaching specific protected repositories
48-
* Generates alerts for push protection bypasses in the **Security** tab of the repository, organization, and enterprise
48+
* Generates alerts for push protection bypasses in the **{% data variables.product.prodname_security_and_quality_tab %}** tab of the repository, organization, and enterprise
4949

5050
{% ifversion secret-risk-assessment %}
5151

content/code-security/concepts/secret-security/about-secret-scanning-for-partners.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ category:
2323

2424
{% data reusables.secret-scanning.what-is-scanned %}
2525

26-
The reason partner alerts are directly sent to the secret providers whenever a leak is detected for one of their secrets is that this enables the provider to take immediate action to protect you and protect their resources. The notification process for regular alerts is different. Regular alerts are displayed on the repository's **Security** tab on {% data variables.product.prodname_dotcom %} for you to resolve.
26+
The reason partner alerts are directly sent to the secret providers whenever a leak is detected for one of their secrets is that this enables the provider to take immediate action to protect you and protect their resources. The notification process for regular alerts is different. Regular alerts are displayed on the repository's **{% data variables.product.prodname_security_and_quality_tab %}** tab on {% data variables.product.prodname_dotcom %} for you to resolve.
2727

2828
{% data reusables.secret-scanning.secret-scanning-pattern-pair-matches %}
2929

content/code-security/concepts/secret-security/about-secret-scanning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ When credentials like API keys and passwords are committed to repositories, they
4040

4141
### {% data variables.product.prodname_secret_scanning_caps %} alerts and remediation
4242

43-
When {% data variables.product.prodname_secret_scanning %} finds a potential secret, {% data variables.product.github %} generates an alert on your repository's **Security** tab with details about the exposed credential.
43+
When {% data variables.product.prodname_secret_scanning %} finds a potential secret, {% data variables.product.github %} generates an alert on your repository's **{% data variables.product.prodname_security_and_quality_tab %}** tab with details about the exposed credential.
4444

4545
When you receive an alert, rotate the affected credential immediately to prevent unauthorized access. While you can also remove secrets from your Git history, this is time-intensive and often unnecessary if you've already revoked the credential.
4646

content/code-security/concepts/security-at-scale/about-security-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ There are dedicated views for each type of security alert. You can limit your an
6565

6666
The application security team at your company can use the different views for both broad and specific analyses of your organization's security status. For example, the team can use the "Overview" dashboard view to track your organization's security landscape and progression. {% ifversion pre-security-configurations %}You can also use security overview to find a set of repositories and enable or disable security features for them all at the same time. For more information, see [AUTOTITLE](/code-security/security-overview/enabling-security-features-for-multiple-repositories).{% endif %}
6767

68-
You can find security overview on the **Security** tab for any organization. Each view shows a summary of the data that you have access to. As you add filters, all data and metrics across the view change to reflect the repositories or alerts that you've selected.
68+
You can find security overview on the **{% data variables.product.prodname_security_and_quality_tab %}** tab for any organization. Each view shows a summary of the data that you have access to. As you add filters, all data and metrics across the view change to reflect the repositories or alerts that you've selected.
6969

7070
Security overview has multiple views that provide different ways to explore enablement and alert data.
7171

@@ -85,7 +85,7 @@ You also create and manage security campaigns to remediate alerts from security
8585

8686
## About security overview for enterprises
8787

88-
You can find security overview on the **Security** tab for your enterprise. Each page displays aggregated and repository-specific security information for your enterprise.
88+
You can find security overview on the **{% data variables.product.prodname_security_and_quality_tab %}** tab for your enterprise. Each page displays aggregated and repository-specific security information for your enterprise.
8989

9090
Security overview for enterprises has multiple views that provide different ways to explore data, including an overview dashboard that visualizes alert trends. For information about the dashboard, see [AUTOTITLE](/code-security/security-overview/viewing-security-insights) and [AUTOTITLE](/code-security/reference/security-at-scale/security-overview-dashboard-metrics).
9191

content/code-security/concepts/supply-chain-security/about-dependabot-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ For supported ecosystems, see [AUTOTITLE](/code-security/supply-chain-security/u
3434

3535
## Understanding alerts
3636

37-
When {% data variables.product.github %} detects a vulnerable dependency, a {% data variables.product.prodname_dependabot %} alert appears on the repository's **Security** tab and dependency graph. Each alert includes:
37+
When {% data variables.product.github %} detects a vulnerable dependency, a {% data variables.product.prodname_dependabot %} alert appears on the repository's **{% data variables.product.prodname_security_and_quality_tab %}** tab and dependency graph. Each alert includes:
3838

3939
* A link to the affected file
4040
* Details about the vulnerability and its severity

content/code-security/concepts/supply-chain-security/about-supply-chain-security.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ For more information about dependency review, see [AUTOTITLE](/code-security/sup
8181
{% data variables.product.prodname_dependabot %} keeps your dependencies up to date by informing you of any security vulnerabilities in your dependencies and automatically opening pull requests to upgrade your dependencies. {% data variables.product.prodname_dependabot %} pull requests will target the next available secure version when a {% data variables.product.prodname_dependabot %} alert is triggered, or to the latest version when a release is published.
8282

8383
The term "{% data variables.product.prodname_dependabot %}" encompasses the following features:
84-
* {% data variables.product.prodname_dependabot_alerts %}: Displayed notification on the **Security** tab for the repository, and in the repository's dependency graph. The alert includes a link to the affected file in the project, and information about a fixed version.
84+
* {% data variables.product.prodname_dependabot_alerts %}: Displayed notification on the **{% data variables.product.prodname_security_and_quality_tab %}** tab for the repository, and in the repository's dependency graph. The alert includes a link to the affected file in the project, and information about a fixed version.
8585
* {% data variables.product.prodname_dependabot_updates %}:
8686
* {% data variables.product.prodname_dependabot_security_updates %}: Triggered updates to upgrade your dependencies to a secure version when an alert is triggered.
8787
* {% data variables.product.prodname_dependabot_version_updates %}: Scheduled updates to keep your dependencies up to date with the latest version.
@@ -113,7 +113,7 @@ For more information, see [AUTOTITLE](/code-security/dependabot/working-with-dep
113113
* A new advisory is added to the {% data variables.product.prodname_advisory_database %}{% else %}
114114
* New advisory data is synchronized to your instance each hour from {% data variables.product.prodname_dotcom_the_website %}. {% data reusables.security-advisory.link-browsing-advisory-db %}{% endif %}
115115
* The dependency graph for the repository changes
116-
* {% data variables.product.prodname_dependabot_alerts %} are displayed on the **Security** tab for the repository and in the repository's dependency graph. The alert includes a link to the affected file in the project, and information about a fixed version.
116+
* {% data variables.product.prodname_dependabot_alerts %} are displayed on the **{% data variables.product.prodname_security_and_quality_tab %}** tab for the repository and in the repository's dependency graph. The alert includes a link to the affected file in the project, and information about a fixed version.
117117

118118
For more information, see [AUTOTITLE](/code-security/dependabot/dependabot-alerts/about-dependabot-alerts).
119119

@@ -129,7 +129,7 @@ For more information, see [AUTOTITLE](/code-security/dependabot/dependabot-alert
129129
* The dependency graph for a repository changes
130130

131131
You can view {% data variables.product.prodname_dependabot_malware_alerts_short %} for a repository:
132-
* From the **Security** tab
132+
* From the **{% data variables.product.prodname_security_and_quality_tab %}** tab
133133
* In the dependency graph
134134

135135
Each alert includes a link to the affected file in the project, as well as the patch version number for the package (if available).

content/code-security/concepts/supply-chain-security/dependabot-malware-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Alerts are also generated when you push commits that add a known malicious packa
2424
2525
## Alert contents
2626

27-
When {% data variables.product.prodname_dependabot %} detects a malicious dependency, a {% data variables.product.prodname_dependabot_malware_alert_short %} appears on the repository's **Security** tab. Each alert includes:
27+
When {% data variables.product.prodname_dependabot %} detects a malicious dependency, a {% data variables.product.prodname_dependabot_malware_alert_short %} appears on the repository's **{% data variables.product.prodname_security_and_quality_tab %}** tab. Each alert includes:
2828

2929
* A link to the affected file
3030
* Details about the malicious package, including the package name, affected versions, and the patched version (when available)

content/code-security/getting-started/github-security-features.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,7 @@ For information about how you can try {% data variables.product.prodname_GH_secr
148148

149149
### {% data variables.secret-scanning.user_alerts_caps %}
150150

151-
Automatically detect tokens or credentials that have been checked into a repository. You can view alerts for any secrets that {% data variables.product.github %} finds in your code, in the **Security** tab of the repository, so that you know which tokens or credentials to treat as compromised. For more information, see [AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning/about-alerts#about-user-alerts).
151+
Automatically detect tokens or credentials that have been checked into a repository. You can view alerts for any secrets that {% data variables.product.github %} finds in your code, in the **{% data variables.product.prodname_security_and_quality_tab %}** tab of the repository, so that you know which tokens or credentials to treat as compromised. For more information, see [AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning/about-alerts#about-user-alerts).
152152

153153
{% data reusables.advanced-security.available-for-public-repos %}
154154

0 commit comments

Comments
 (0)