Q: 14
– [Configure and Use Dependency Management]
Which security feature shows a vulnerable dependency in a pull request?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.