GitHub goes open source on security research
Community members, enthusiasts, researchers, and academics are now able to submit their own research to widen the understanding of security vulnerabilities


GitHub has opened up its security Advisory Database to community contributions with the aim of furthering the security of the software supply chain.
Independent security researchers, academics, and enthusiasts are now able to submit their own research into security vulnerabilities into the open source development platform to provide further insight into existing vulnerabilities.
The process will work much like the platform’s pull requests feature that’s already used by developers to suggest changes to projects. Those with deeper insight into an existing security vulnerability will be able to submit their findings via a pull request and it will then be verified before being published.
Security researchers from the GitHub Security Lab, as well as the maintainer of the project who filed the vulnerability, are tasked with verifying each submission. If approved, the community contribution will be merged into the public advisory and credit will be displayed on the user’s profile.
To submit research to deepen the understanding of a given vulnerability, community researchers can navigate to a vulnerability’s advisory on the Advisory Database and click ‘suggest improvements for this vulnerability’ in the right-side pane on the page.
In addition to accepting community submissions, GitHub will also be publishing the contents of the Advisory Database to a new public repository to make it easier for the community to benefit from the professionally verified data.
Just like with the current data in the Advisory Database, the contents of the new public repository will be licensed under the Creative Commons license, meaning that the data will always be free and usable by the community.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
What is the GitHub Advisory Database?
The GitHub Advisory Database pulls in security vulnerabilities from a number of verified sources, allowing users to search for issues that affect open source projects hosted on the platform.
Security vulnerabilities are sourced from the National Vulnerability Database, the npm security advisories database, detected issues in public commits on GitHub projects, and security advisories directly reported on GitHub.
GitHub is a CVE Naming Authority (CNA) and can assign Common Vulnerability Exposure (CVE) identification numbers for the verified security flaws that are submitted through its platform.
RELATED RESOURCE
Modernise your server infrastructure for speed and security
Infrastructure lifecycle automation paves the way for an adaptive, resilient organisation
The vulnerabilities listed in the Advisory Database are split into two categories: GitHub-reviewed advisories and unreviewed advisories. The verified entries in the database also inform GitHub’s Dependabot feature, which automatically alerts and updates projects when it discovers a security vulnerability.
“The GitHub Advisory Database is the largest database of vulnerabilities in software dependencies in the world,” said GitHub.
“It is maintained by a dedicated team of full-time curators and powers the security audit experience for npm and NuGet, as well as GitHub’s own Dependabot alerts. By making it easier to contribute to and consume, we hope it will power even more experiences and will further help improve the security of all software.”

Connor Jones has been at the forefront of global cyber security news coverage for the past few years, breaking developments on major stories such as LockBit’s ransomware attack on Royal Mail International, and many others. He has also made sporadic appearances on the ITPro Podcast discussing topics from home desk setups all the way to hacking systems using prosthetic limbs. He has a master’s degree in Magazine Journalism from the University of Sheffield, and has previously written for the likes of Red Bull Esports and UNILAD tech during his career that started in 2015.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
Hackers are targeting Ivanti VPN users again – here’s what you need to know
News Ivanti has re-patched a security flaw in its Connect Secure VPN appliances that's been exploited by a China-linked espionage group since at least the middle of March.
By Emma Woollacott
-
Organizations urged to act fast after GitHub Action supply chain attack
News More than 20,000 organizations may be at risk following a supply chain attack affecting tj-actions/changed-files GitHub Action.
By Emma Woollacott
-
Nearly a million devices were infected in a huge GitHub malvertising campaign
News Microsoft has alerted users to a malvertising campaign leveraging GitHub to infect nearly 1 million devices around the world.
By Solomon Klappholz
-
Broadcom issues urgent alert over three VMware zero-days
News The firm says it has information to suggest all three are being exploited in the wild
By Solomon Klappholz
-
Nakivo backup flaw still present on some systems months after firms’ ‘silent patch’, researchers claim
News Over 200 vulnerable Nakivo backup instances have been identified months after the firm silently patched a security flaw.
By Solomon Klappholz
-
'GitVenom' campaign uses dodgy GitHub repositories to spread malware
News Security researchers have issued an alert over a campaign using GitHub repositories to distribute malware, with users lured in by fake projects.
By Solomon Klappholz
-
Everything you need to know about the Microsoft Power Pages vulnerability
News A severe Microsoft Power Pages vulnerability has been fixed after cyber criminals were found to have been exploiting unpatched systems in the wild.
By Solomon Klappholz
-
Malicious GitHub repositories target users with malware
News Criminals are exploiting GitHub's reputation to install Lumma Stealer disguised as game hacks and cracked software
By Emma Woollacott