1. GitHub Docs, "About Dependabot alerts." This document states, "When your code depends on a package that has a security vulnerability, we'll generate a Dependabot alert and you can see it on the Security tab of the repository." This directly supports option A.
2. GitHub Docs, "Configuring notifications for Dependabot alerts." Under the section "About notifications for Dependabot alerts," the documentation specifies, "By default, we notify people with admin permissions in the affected repositories..." This directly supports option B.
3. GitHub Docs, "About the GitHub Advisory Database." This page explains that Dependabot uses the GitHub Advisory Database as its source for vulnerabilities, which refutes the idea of a real-time consultation as suggested in option D.
4. GitHub Docs, "Quickstart for Dependabot alerts." This guide confirms that for private repositories, you must "enable the dependency graph and Dependabot alerts for your repository," which contradicts the claim in option C that it is on by default for all private repositories.