1. GitHub Docs, "About dependency review": "Dependency review helps you understand dependency changes and the security impact of these changes at every pull request. It provides an easily understandable visualization of dependency changes with a rich diff on the 'Files Changed' tab of a pull request. Dependency review informs you of... whether any of the new dependencies contain known vulnerabilities."
Source: GitHub, Inc. Official Documentation. Retrieved from https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review
2. GitHub Docs, "Configuring dependency review": "The dependency review action is available for all public repositories, and for private repositories that have GitHub Advanced Security enabled... The action scans for vulnerable versions of dependencies introduced in pull requests and warns you about the associated security vulnerabilities. This gives you better visibility of what's changing in a pull request, and helps prevent vulnerabilities from being added to your repository."
Source: GitHub, Inc. Official Documentation. Retrieved from https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/configuring-dependency-review
3. GitHub Docs, "About Dependabot alerts": "GitHub detects vulnerable dependencies in public repositories and generates Dependabot alerts by default... For private repositories, you need to enable the dependency graph and Dependabot alerts... GitHub doesn't scan dependencies on forks." (Note: This describes scanning the repository's state, not the changes in a pull request).
Source: GitHub, Inc. Official Documentation. Retrieved from https://docs.github.com/en/code-security/dependabot/dependabot-alerts/about-dependabot-alerts