Github activity
GitHub Activity monitoring protects your source code and development pipeline from supply chain attacks, malicious commits, and repository security issues.

Why GitHub Monitoring Matters
Supply Chain Attacks
Attackers increasingly target development infrastructure:
Compromised developer accounts pushing malicious code
Dependency confusion attacks
Malicious packages in package repositories
Stolen credentials used to access private repositories
Direct Financial Impact
In Web3, compromised code leads to:
Backdoored smart contracts stealing user funds
Modified deployment scripts redirecting transactions
Injected wallet draining code in frontends
Stolen private keys from compromised CI/CD
Monitoring Capabilities
Repository Connection
Connect GitHub repositories to Sentry:
Organization-Level: Link your entire GitHub organization to monitor all repositories automatically.
Selective Monitoring: Choose specific critical repositories (smart contracts, deployment tools, infrastructure code).
Webhook Integration: Sentry registers webhooks to receive real-time events from GitHub.
Commit Monitoring
Author Verification: Detect commits with mismatched author information:
Display name doesn't match known team member
Email address doesn't match verified organizational emails
Suspicious commit author patterns (unusual names, temporary emails)
Commit Overwrite Detection: Alert when git history is rewritten:
Force pushes to protected branches
Commit amending on shared branches
History tampering attempts
Deleted commits that may contain evidence
Suspicious Patterns:
Large commits outside normal business hours
Commits from unusual geographic locations
Rapid succession of commits (potential automated attack)
Commits to sensitive files (deployment scripts, config files)
Security Scanning Integration
Dependabot Alerts: Automatically ingest and display Dependabot security alerts:
Vulnerable dependencies in package.json, requirements.txt, go.mod, etc.
Severity levels (critical, high, medium, low)
Available patches and upgrade paths
CVSS scores and CVE identifiers
Secret Scanning: GitHub's secret scanning results forwarded to Sentry:
Exposed API keys, tokens, passwords in code
Accidentally committed credentials
Private keys and certificates
Database connection strings
Code Scanning (GitHub Advanced Security): For organizations with GHAS:
CodeQL analysis results
SAST (Static Application Security Testing) findings
Custom code scanning alerts
Compliance rule violations
Repository Health
Branch Protection: Monitor branch protection settings:
Required reviews before merging
Required status checks
Administrator bypass permissions
Force push restrictions
Access Control Auditing:
Who has write/admin access to critical repositories
Recently added collaborators
Teams with repository access
Outside collaborators
Repository Configuration:
Private vs public status
Security features enabled (Dependabot, secret scanning)
Default branch settings
Webhooks and integrations
Next Steps
Alert Types & Response - Alert severities and response procedures
Configuration & Best Practices - Setup and security best practices
Last updated