GitHub Dependabot API

Dependabot is a GitHub-native dependency update and security alerting feature accessed entirely via the GitHub REST API — there is no standalone Dependabot API; agents use GitHub API endpoints under /repos/{owner}/{repo}/dependabot/ to manage alerts, auto-dismissals, and update configurations.

Evaluated Mar 06, 2026 (0d ago) vcurrent
Homepage ↗ Developer Tools dependabot github dependencies security vulnerabilities automation sca
⚙ Agent Friendliness
63
/ 100
Can an agent use this?
🔒 Security
90
/ 100
Is it safe for agents?
⚡ Reliability
87
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
--
Documentation
88
Error Messages
82
Auth Simplicity
80
Rate Limits
85

🔒 Security

TLS Enforcement
100
Auth Strength
88
Scope Granularity
85
Dep. Hygiene
90
Secret Handling
88

Fine-grained PATs and GitHub Apps support repository-scoped permissions with explicit Dependabot alerts read/write scope. All traffic over TLS. GitHub's overall security posture applies. Dependabot update secrets are encrypted with repository public key before transmission.

⚡ Reliability

Uptime/SLA
90
Version Stability
88
Breaking Changes
85
Error Recovery
85
AF Security Reliability

Best When

Best when your codebase is hosted on GitHub and you need agents to automate security alert triage, dependency PR monitoring, and update policy enforcement without a separate SCA tool.

Avoid When

Avoid when your repositories are not on GitHub or when you need deep SCA capabilities (transitive analysis, SBOM generation, license compliance) that Dependabot does not provide.

Use Cases

  • Query all open Dependabot security alerts across a repository to populate a vulnerability tracking dashboard
  • Dismiss or acknowledge specific Dependabot alerts in bulk after security team triage and documented acceptance
  • List Dependabot pull requests across all repositories in an organization to monitor open dependency update backlog
  • Enable Dependabot security updates programmatically for newly created repositories via repository settings API
  • Retrieve GHSA advisory details linked to a Dependabot alert to assess severity and cross-reference affected packages

Not For

  • Non-GitHub repositories — Dependabot is GitHub-exclusive and has no integration path for GitLab, Bitbucket, or self-hosted git servers
  • Real-time vulnerability scanning at artifact build time (use Sonatype Lifecycle, Snyk, or JFrog Xray instead)
  • License compliance analysis beyond the basic dependency update scope Dependabot covers

Interface

REST API
Yes
GraphQL
Yes
gRPC
No
MCP Server
No
SDK
Yes
Webhooks
Yes

Authentication

Methods: bearer_token
OAuth: Yes Scopes: Yes

Accessed via GitHub API using a GitHub Personal Access Token (PAT) or GitHub App installation token. Required scopes: security_events (read/write for alerts) and repo for repository access. GitHub Apps are preferred for agent automation as they support fine-grained repository-level permissions. Dependabot has no independent auth — all access flows through GitHub authentication.

Pricing

Model: free
Free tier: Yes
Requires CC: No

Dependabot is included with every GitHub repository at no additional cost. Dependabot version updates (PRs for non-security bumps) are also free.

Agent Metadata

Pagination
cursor
Idempotent
Full
Retry Guidance
Documented

Known Gotchas

  • Dependabot has no standalone API — agents must use the GitHub REST API and cannot interact with Dependabot independently of a GitHub token with correct scopes
  • Dependabot alerts are scoped per-repository — listing alerts across an entire organization requires iterating over all repositories, which can be slow and rate-limit-intensive for large orgs
  • Auto-dismissed alerts (dismissed by Dependabot itself) are distinct from user-dismissed alerts and have different state values — agents must handle both states when filtering active alerts
  • Dependabot security updates (automatic PRs) require both Dependabot alerts and Dependabot security updates to be enabled separately at the repository level — enabling alerts does not automatically enable PRs
  • The dependabot/secrets API for managing repository secrets used in Dependabot update jobs requires separate secret_scanning scope and uses libsodium public-key encryption for secret values

Alternatives

Full Evaluation Report

Detailed scoring breakdown, competitive positioning, security analysis, and improvement recommendations for GitHub Dependabot API.

$99

Scores are editorial opinions as of 2026-03-06.

5215
Packages Evaluated
26151
Need Evaluation
173
Need Re-evaluation
Community Powered