Description
I propose that we pilot use of the GitHub recommended security configuration for all existing and new repositories in a "Don't enforce" way, and that we at a later time consider transitioning to "Enforce" based on gained experience. By piloting this security configuration in our GitHub org, we gain experience of relevance for other Jupyter organizations. jupyter/security#102 tracks this on a Jupyter enterprise level including 16 active Jupyter GitHub orgs.
This is how the security configuration looks as seen from JupyterHub org's settings:
Note that JupyterHub currently have a security configuration applied for four repositories (jupyterhub-container-images, action-get-guayio-tags, pamela, escapism) called "Legacy" which is applied to all new repositories, but I think it is either not doing anything or disabling security features otherwise on by default (see the legacy security config here here).