Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Hallucinated code, real threat: How slopsquatting targets AI-assisted development

      July 1, 2025

      CompTIA State of the Tech Workforce 2025 released, Meta joins Kotlin Foundation, Percona launches Transparent Data Encryption for PostgreSQL – Daily News Digest

      July 1, 2025

      Turning User Research Into Real Organizational Change

      July 1, 2025

      June 2025: All AI updates from the past month

      June 30, 2025

      Intel’s former CEO speaks out — “I wanted to finish what I started”

      July 1, 2025

      NVIDIA RTX 5000 GPUs are on sale at Newegg, and discounted gift cards can be used towards your purchase — It’s free money

      July 1, 2025

      False alarm! Microsoft rectifies language that implied Windows may have lost millions of users since Windows 11 debut

      July 1, 2025

      ROG Ally drops to its lowest price ever, making it less than Switch 2 — Here’s why it could be your dream gaming handheld

      July 1, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      1KB JavaScript Demoscene Challenge Just Launched

      July 1, 2025
      Recent

      1KB JavaScript Demoscene Challenge Just Launched

      July 1, 2025

      Salesforce Marketing Cloud for Medical Devices

      July 1, 2025

      June report 2025

      July 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Intel’s former CEO speaks out — “I wanted to finish what I started”

      July 1, 2025
      Recent

      Intel’s former CEO speaks out — “I wanted to finish what I started”

      July 1, 2025

      NVIDIA RTX 5000 GPUs are on sale at Newegg, and discounted gift cards can be used towards your purchase — It’s free money

      July 1, 2025

      False alarm! Microsoft rectifies language that implied Windows may have lost millions of users since Windows 11 debut

      July 1, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»News & Updates»Understand your software’s supply chain with GitHub’s dependency graph

    Understand your software’s supply chain with GitHub’s dependency graph

    July 1, 2025

    What if you could spot the weakest link in your software supply chain before it breaks?

    With GitHub’s dependency graph, you can. By providing a clear, complete view of the external packages your code depends on, both directly and indirectly, it allows you to understand, secure, and manage your project’s true footprint.

    If you’re like me and sometimes lose track of what’s actually powering your applications (we’ve all been there!), GitHub’s dependency graph is about to become your new best friend.

    What is the dependency graph?

    Here’s the thing: Every modern software project is basically an iceberg. That small manifest file with your direct dependencies seems quite harmless at first glance. But underneath? There’s this massive, hidden world of transitive dependencies that most of us never think about. The GitHub dependency graph maps this entire underwater world. Think of it like a family tree, but for your code. Each package is a family member, and each dependency relationship shows who’s related to whom (and trust me, some of these family trees get really complicated).

    Each package is a node. Each dependency relationship is an edge. The result? A full visual and structured representation of your software’s external codebase.

    In some cases, 95–97% of your code is actually someone else’s. The dependency graph helps you make sense of that reality.

    GitHub engineer Eric Sorenson

    Let that sink in for a moment. We’re basically curators of other people’s work, and the dependency graph finally helps us make sense of that reality.

    Why it matters

    When vulnerabilities are discovered in open source packages, the consequences ripple downstream. If you don’t know a vulnerable dependency is part of your project, it’s hard to take action.

    The dependency graph isn’t just a cool visualization (though it is pretty neat to look at). It’s the foundation that makes Dependabot alerts possible. When a security issue is found in any of your dependencies (even a transitive one), GitHub notifies you. You get the full picture of what’s in your supply chain, how it got there, and what you can actually do about it.

    See it in action: From 21 to 1,000 dependencies

    Eric showed us a project that looked innocent enough:

    • 21 direct dependencies (the ones actually listed in package.json)
    • 1,000 total dependencies (including everything that got pulled in along the way)

    With the dependency graph, you can finally:

    • Understand which dependencies are direct vs. transitive
    • Trace how a package like Log4j ended up in your codebase. (Spoiler: it probably came along for the ride with something else.)
    • Know what’s yours to fix and what depends on an upstream maintainer

    Tighten your supply chain with Dependabot

    Dependabot runs on top of the dependency graph—so enabling the graph is what makes Dependabot’s vulnerability alerts and automatic fix suggestions possible.

    Pro tip: Filter for direct dependencies first. These are the ones you can actually control, so focus your energy there instead of pulling your hair out over transitive dependencies that are someone else’s responsibility.

    How to enable the dependency graph

    You can enable the dependency graph in your repository settings under Security > Dependency Graph. If you turn on Dependabot, the graph will be enabled automatically.

    Using GitHub Actions? Community-maintained actions can generate a Software Bill of Materials (SBOM) and submit it to GitHub’s Dependency submission API, even if your language ecosystem doesn’t support auto-discovery.

    ✅ The best part? Dependency graph and Dependabot alerts are free for all repositories.

    TL;DR

    You can’t secure what you can’t see. GitHub’s dependency graph gives you visibility into the 90%+ of your codebase that comes from open source libraries and helps you take action when it counts.

    • Enable it today (seriously, do it now)
    • Use it with Dependabot for automated alerts and fixes
    • Finally discover what’s actually in your software supply chain

    Your future self (and your security team) will thank you.

    Want to learn more about the GitHub dependency graph? Explore the documentation >

    The post Understand your software’s supply chain with GitHub’s dependency graph appeared first on The GitHub Blog.

    Source: Read MoreÂ

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleGoogle fixes fourth actively exploited Chrome zero-day of 2025
    Next Article digiKam 8.7.0 Released with Improved AI Tools

    Related Posts

    News & Updates

    Intel’s former CEO speaks out — “I wanted to finish what I started”

    July 1, 2025
    News & Updates

    NVIDIA RTX 5000 GPUs are on sale at Newegg, and discounted gift cards can be used towards your purchase — It’s free money

    July 1, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised

    Development

    Critical Langflow Vulnerability Allows Malicious Code Injection – Technical Details Revealed

    Security

    Anthropic’s new AI models for classified info are already in use by US gov

    News & Updates

    Challenges of Performance Testing: Insights from the Field

    Development

    Highlights

    CVE-2025-4417 – AVEVA PI Connector for CygNet Cross-Site Scripting (XSS)

    June 12, 2025

    CVE ID : CVE-2025-4417

    Published : June 12, 2025, 8:15 p.m. | 1 hour, 46 minutes ago

    Description : A cross-site scripting vulnerability exists in
    AVEVA PI Connector for CygNet
    Versions 1.6.14 and prior that, if exploited, could allow an
    administrator miscreant with local access to the connector admin portal
    to persist arbitrary JavaScript code that will be executed by other
    users who visit affected pages.

    Severity: 5.5 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    I used ChatGPT to translate image text when Google’s tool failed me – and things got weird

    April 21, 2025

    AI Threats Are Evolving Fast — Learn Practical Defense Tactics in this Expert Webinar

    April 3, 2025

    Building an Infinite Marquee Along an SVG Path with React & Motion

    June 17, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.