
Summary
This analytic rule monitors for the disabling of Dependabot security features in GitHub repositories, an action that could signal potential malicious activity. Dependabot is a tool that automatically scans for and mitigates security vulnerabilities in dependencies. When a user disables this feature, it may indicate an attempt by an attacker to inhibit automatic detection and resolution of known vulnerabilities, thus increasing the risk of exploitation. The detection leverages GitHub Organizations Audit Logs to identify configuration changes related to Dependabot, and aims to alert security operations teams about this potentially harmful action, which could be a precursor to supply chain attacks. Identifying such configurations is vital for maintaining secure DevOps practices and protecting the integrity of software supply chains.
Categories
- Cloud
- Web
- Application
Data Sources
- Group
- Application Log
ATT&CK Techniques
- T1562.001
- T1195
Created: 2025-01-14