You can review the security log for your personal account to better understand actions you've performed and actions others have performed that involve you.
The security log lists all actions performed within the last 90 days.
The name for each audit log entry is composed of a category of events, followed by an operation type. For example, the repo.create entry refers to the create operation on the repo category.
repo.create
create
repo
Each audit log entry shows applicable information about an event, such as:
Note that you cannot search for entries using text. You can, however, construct search queries using a variety of filters. Many operators used when querying the log, such as -, >, or <, match the same format as searching across GitHub. For more information, see About searching on GitHub.
-
>
<
Use the operation qualifier to limit actions to specific types of operations. For example:
operation
operation:access
operation:authentication
operation:create
operation:modify
operation:remove
operation:restore
operation:transfer
Use the repo qualifier to limit actions to a specific repository. For example:
repo:my-org/our-repo
our-repo
my-org
repo:my-org/our-repo repo:my-org/another-repo
another-repo
-repo:my-org/not-this-repo
not-this-repo
Note that you must include the account name within the repo qualifier; searching for just repo:our-repo will not work.
repo:our-repo
The actor qualifier can scope events based on who performed the action. For example:
actor
actor:octocat
octocat
actor:octocat actor:hubot
hubot
-actor:hubot
Note that you can only use a GitHub username, not an individual's real name.
The events listed in your security log are triggered by your actions. Actions are grouped into different categories. For the full list of events in each category, see Security log events.
billing
codespaces
copilot
marketplace_agreement_signature
marketplace_listing
oauth_access
oauth_authorization
passkey
payment_method
personal_access_token
profile_picture
project
public_key
sponsors
two_factor_authentication
user
You can export the log as JSON data or a comma-separated value (CSV) file with the Export dropdown menu.
To filter the results in your export, search by one or more of these supported qualifiers before using the Export dropdown menu.
action
org
created
actor_location.country_code
created_at
data.email
data.hook_id
data.events
data.events_were
data.target_login
data.old_user
data.team