Skip to content
All posts

GitHub's Latest Dependency Graph Update: What Developers Need to Know

On June 11th, GitHub rolled out an important update to its dependency graph feature that promises to improve how to manage software dependencies. This update is a crucial step towards more accurate and comprehensive Software Bill of Materials (SBOM) generation, especially when dealing with version ranges in manifest files.

CN-Assets (77)

The Challenge with Version Ranges

Previously, when a manifest file included a version range of a package (e.g., version < 3), GitHub faced limitations in generating a complete SBOM. The SBOM, a key document for understanding the components and dependencies of a software project, would often lack a crucial element: the package URL (purl). Without the purl, identifying the specific packages in use became challenging, potentially leading to gaps in security and dependency management.

What Has Changed?

With the latest update, GitHub has improved the SBOM generation process. Now, when a manifest file references a package within a range, the generated SBOM will include the purl even if the version field is not specified. This change adheres to the SBOM specification, where the version field is optional, thus allowing for more flexibility and completeness in the data provided.

Benefits for Developers and DevOps Engineers

  1. Enhanced Clarity: Including the purl in the SBOM, despite the absence of a specific version, provides a clearer identification of the packages being used in a repository. This makes it easier to track and manage dependencies accurately.

  2. Improved Security: More comprehensive SBOMs mean better visibility into the software supply chain. This visibility is crucial for identifying and mitigating security vulnerabilities, ensuring all components are accounted for and up-to-date.

  3. Better Compliance: Adhering to industry standards and regulatory requirements is simplified with more complete SBOMs. This update helps organizations remain compliant with supply chain security mandates by providing detailed and accurate dependency information.

How to Leverage the Updated Dependency Graph

To make the most of this update, developers and DevOps engineers should:

  • Review and Update Manifest Files: Ensure that manifest files in your repositories are up-to-date and correctly reference all dependencies. While the purl will be included even for ranges, having accurate version information where possible remains a best practice.

  • Regularly Monitor SBOMs: Incorporate regular checks of the generated SBOMs into your workflow. This will help you stay on top of any changes in dependencies and address potential issues proactively.

  • Utilize GitHub's Security Features: Take advantage of GitHub's suite of security tools, such as Dependabot alerts and automated security updates, which work hand-in-hand with the enhanced SBOM data to keep your projects secure.


The June 11th update to GitHub's dependency graph is a significant enhancement for the developer and DevOps communities. By including the purl in SBOMs for packages referenced by version ranges, GitHub has made it easier to manage and secure software dependencies. This update not only improves the accuracy of dependency tracking but also strengthens the overall security posture of software projects.

For more details on how to use and benefit from the GitHub dependency graph, visit the GitHub documentation.

CN-Assets (78)

Embrace this update to enhance your software supply chain management and security practices today.