Triage incoming issues
- Webhook fires on every new issue
- Persona summarises and labels it
- Assigns the right engineer
867 tools available · 46 triggers
GitHub is a code hosting platform for version control and collaboration, offering Git-based repository management, issue tracking, and continuous integration features
Connect GitHub to Definable to triage issues, review pull requests, monitor builds. Personas call GitHub's 867 tools (and react to 46 triggers) directly from chat or scheduled flows. Wire it into a triage, review, or release-management persona — every action runs scoped, reviewable, and logged.
Every GitHub action below is a callable tool any Definable persona can invoke.
Tool to abort a repository migration that is queued or in progress. Use when you need to cancel an ongoing migration operation.
Accepts a PENDING repository invitation that has been issued to the authenticated user.
Adds GitHub Apps to the list of apps allowed to push to a protected branch. The branch must already have protection rules with restrictions enabled. This endpoint only works for organization repositories, not personal repositories. Apps must be installed on the repository with 'contents' write permissions.
Adds a GitHub user as a repository collaborator, or updates their permission if already a collaborator; `permission` applies to organization-owned repositories (personal ones default to 'push' and ignore this field), and an invitation may be created or permissions updated directly.
Adds assignees to a GitHub issue. This action only adds users - it does not remove existing assignees. Changes are silently ignored if the authenticated user lacks push access to the repository.
Adds one or more email addresses (which will be initially unverified) to the authenticated user's GitHub account; use this to associate new emails, noting an email verified for another account will error, while an existing email for the current user is accepted.
Tool to add a custom field to a user-owned GitHub Projects V2 project. Use when you need to add fields like status, priority, or custom data to organize project items.
Tool to add an issue or pull request to a user-owned GitHub project. Use when you need to add existing repository items to a project board.
Adds labels (provided in the request body) to a repository issue; labels that do not already exist are created.
Adds new custom labels to an existing self-hosted runner for an organization; existing labels are not removed, and duplicates are not added.
Adds a GitHub user to a team or updates their role (member or maintainer), inviting them to the organization if not already a member; idempotent, returning current details if no change is made.
Adds a classic project to a team or updates the team's permission on it. This endpoint grants or updates permissions for a team on a specific classic project (not Projects V2). The authenticated user must have admin permissions for the project. Both the team and project must belong to the same organization. Requirements: - The project must be a classic project (not GitHub Projects V2) - The authenticated user must have admin permissions on the project - The team and project must be in the same organization - Requires 'admin:org' scope for the authentication token Returns HTTP 204 No Content on success, 403 if project is not an org project, or 404 if the organization, team, or project is not found.
Sets or updates a team's permission level for a repository within an organization; the team must be a member of the organization.
Adds a specified GitHub user as a collaborator to an existing organization project with a given permission level. Note: This endpoint is for organization projects (classic). You must be an organization owner or a project admin to add a collaborator. Classic projects are being deprecated in favor of the new Projects experience.
Adds a repository to a GitHub App installation, granting the app access; requires authenticated user to have admin rights for the repository and access to the installation.
Adds a repository to an existing organization-level GitHub Actions secret that is configured for 'selected' repository access.
Grants an existing repository access to an existing organization-level Dependabot secret when the secret's visibility is set to 'selected'; the repository must belong to the organization, and the call succeeds without change if access already exists.
Adds and appends custom labels to a self-hosted repository runner, which must be registered and active.
Adds a repository to an organization secret's access list when the secret's visibility is 'selected'; this operation is idempotent.
Grants a repository access to an organization-level GitHub Actions variable, if that variable's visibility is set to 'selected_repositories'.
Grants a specified repository access to an authenticated user's existing Codespaces secret, enabling Codespaces created for that repository to use the secret.
Adds one or more social media links (which must be valid, full URLs for platforms supported by GitHub) to the authenticated user's public GitHub profile.
Adds status check contexts to a protected branch's required status checks. This action appends new status check contexts to the existing list of required status checks for a protected branch. The branch must already have branch protection enabled with status checks configured. Note: The 'contexts' parameter is deprecated by GitHub in favor of 'checks' array. For new implementations, consider using update_status_check_protection with the 'checks' parameter instead.
Tool to add a sub-issue to a parent GitHub issue using GraphQL. Use when you need to establish a parent-child relationship between issues. Requires the 'sub_issues' GraphQL feature to be enabled.
Adds teams to the list of teams with push access to a protected branch. This action grants additional teams push access to a protected branch. Unlike 'Set team access restrictions' (PUT), this action adds to the existing list rather than replacing it entirely. Prerequisites: - The repository must be owned by an organization (not a personal account) - The branch must have protection rules enabled - The branch protection must have restrictions configured - The teams must exist in the organization and have repository access
Adds users to the list of people allowed to push to a protected branch in an organization repository. Important notes: - This action only works on organization-owned repositories (not personal repos) - The branch must already have protection rules with restrictions enabled - Users must have write access to the repository to be added - The combined total of users, apps, and teams is limited to 100 items
Adds organization members to the list of users granted Codespaces access billed to the organization. IMPORTANT: This endpoint requires the organization's Codespaces billing access to be set to 'selected_members' mode. If not already configured, use the GITHUB_MANAGE_ACCESS_CONTROL_FOR_ORGANIZATION_CODESPACES action first to set visibility to 'selected_members'.
Retrieves a map of all top-level GitHub REST API resource URLs and their templates.
Approves a workflow run from a forked repository's pull request; call this when such a run requires manual approval due to workflow configuration.
Assigns an existing organization-level role (identified by `role_id`) to a team (identified by `team_slug`) within a GitHub organization (`org`), provided the organization, team, and role already exist.
Assigns a specific organization role to a user who is a member or an outside collaborator in a GitHub organization, using a valid role ID.
List Docker packages with migration conflicts for the authenticated user. This endpoint lists all Docker packages owned by the authenticated user that encountered namespace conflicts during the Docker-to-GitHub Container Registry (GHCR) migration. Conflicts occur when a package with the same name exists in both the legacy Docker registry and GHCR. IMPORTANT: The Docker registry for GitHub Packages was deprecated on Feb 24, 2025. This endpoint may return a 400 error with message 'Package migration for docker is no longer supported' as the migration period has ended. In this case, the action returns an informative response instead of failing. Use case: Identifying packages that require manual migration to GHCR. Required scope: read:packages (for OAuth and personal access tokens).
Blocks an existing individual GitHub user (not an organization or your own account), preventing them from interacting with your account and repositories.
Blocks a GitHub user from an organization, preventing their contributions, collaboration, and forking of the organization's repositories. Requires admin or 'Blocking users' organization permission (write access).
Cancels an existing, ongoing or queued GitHub Pages deployment for a repository using its `pages_deployment_id`.
Tool to cancel an active GitHub sponsorship using GraphQL. Use when you need to terminate a sponsorship relationship between a sponsor and a sponsorable entity. Either sponsor ID/login and sponsorable ID/login must be provided.
Cancels a workflow run in a GitHub repository if it is in a cancellable state (e.g., 'in_progress' or 'queued'). Returns 202 Accepted on success.
Checks if a gist is starred by the authenticated user. Returns `is_starred: true` if the gist is starred (HTTP 204), or `is_starred: false` if not starred (HTTP 404). Use this to verify star status before starring/unstarring a gist.
Checks if a specified GitHub pull request has been merged, indicated by a 204 HTTP status (merged) or 404 (not merged/found).
Verifies if a GitHub user can be assigned to issues in a repository; assignability is confirmed by an HTTP 204 (No Content) response, resulting in an empty 'data' field in the response.
Checks if a specified GitHub user can be assigned to a given issue within a repository.
Checks if a GitHub user `username` follows `target_user`; returns a 204 HTTP status if true, 404 if not or if users are invalid.
Checks if the specified GitHub user is blocked by the authenticated user; a 204 No Content response indicates the user is blocked, while a 404 Not Found indicates they are not.
Checks if a GitHub user is blocked by an organization. Returns is_blocked=True if the user is blocked (HTTP 204), or is_blocked=False if not blocked (HTTP 404). Requires 'Blocking users' organization permission (read access).
Checks if a user is a collaborator on a specified GitHub repository, returning a 204 status if they are, or a 404 status if they are not or if the repository/user does not exist.
Checks if the authenticated GitHub user follows a target GitHub user. Returns a structured response with is_following=True when following (HTTP 204), or is_following=False when not following (HTTP 404).
Checks if private vulnerability reporting is enabled for the specified repository.
Tool to check if a user is a public member of an organization. Use when you need to verify public organization membership status.
Checks if a team has 'read', 'write', or 'admin' permissions for an organization's specific classic project, returning the project's details if access is confirmed.
Checks a team's permissions for a specific repository within an organization, including permissions inherited from parent teams.
Checks if a GitHub App or OAuth access_token is valid for the specified client_id and retrieves its details, typically to verify its active status and grants. NOTE: This endpoint requires Basic Authentication using the OAuth App's client_id as username and client_secret as password. The access_token parameter must be an OAuth token issued by the specified OAuth App.
Tool to clear the value of a field for an item in a GitHub Project V2. Use when you need to remove or reset a field value (text, number, date, assignees, labels, single-select, iteration, or milestone fields).
Deletes GitHub Actions caches from a repository matching a specific `key` and an optional Git `ref`, used to manage storage or clear outdated/corrupted caches; the action succeeds even if no matching caches are found to delete.
Removes all custom labels from a self-hosted runner for an organization; default labels (e.g., 'self-hosted', 'linux', 'x64') will remain.
Tool to atomically create, update, or delete multiple files in a GitHub repository as a single commit. Uses Git Data APIs to avoid SHA mismatch conflicts that occur with the Contents API when multiple files are modified in parallel. Use when you need to make multi-file changes reliably. BRANCH CREATION: When committing to a new branch (e.g., 'fix/my-fix' or 'feature/new-feature'), you MUST provide 'base_branch' (typically 'main' or 'master') to create the branch from. If the branch already exists, base_branch is not needed. This action handles race conditions automatically: if the branch is updated by another commit between fetching the HEAD and updating the reference (resulting in a 422 'not a fast forward' error), the action will retry by refetching the HEAD and rebasing changes. Use max_retries to control this behavior.
Compares two commit points (commits, branches, tags, or SHAs) within a repository or across forks, using `BASE...HEAD` or `OWNER:REF...OWNER:REF` format for the `basehead` parameter.
Generates a JIT configuration for a GitHub organization's new self-hosted runner to run a single job then unregister; requires admin:org scope and the runner_group_id must exist in the organization.
Sets or updates the OIDC subject claim customization template for an existing GitHub organization by specifying which claims (e.g., 'repo', 'actor') form the OIDC token's subject (`sub`). This action customizes which claim keys are included in the OIDC subject claim for the specified organization. It allows for fine-tuning the content of the subject claim based on organizational needs.
Converts an existing organization member, who is not an owner, to an outside collaborator, restricting their access to explicitly granted repositories.
Creates a Git blob in a repository, requiring content and encoding ('utf-8' or 'base64'). Requires write access to the repository.
Creates a new check run for a specific commit in a repository, used by external services to report status, detailed feedback, annotations, and images directly within the GitHub UI. NOTE: This endpoint requires GitHub App authentication - OAuth tokens and personal access tokens cannot create check runs.
Creates a new check suite for a specific commit (`head_sha`) in an original repository (not a fork). IMPORTANT: This endpoint requires a GitHub App installation access token - OAuth tokens and classic personal access tokens cannot use this endpoint. GitHub dispatches a `check_suite` webhook event with the `requested` action upon success.
Creates a GitHub Codespace for the authenticated user, requiring a JSON request body with either `repository_id` (integer) or a `pull_request` object (containing `pull_request_number` (integer) and `repository_id` (integer)). This action allows users to set up a development environment quickly by creating a codespace from a specified repository or pull request.
Creates a GitHub Codespace for an open pull request in a Codespaces-enabled repository, with options to customize its configuration.
Creates a GitHub Codespace for the authenticated user in a specified repository, which must be accessible and use a valid `devcontainer.json` if `devcontainer_path` is specified.
Creates a new commit in a GitHub repository; the `tree` SHA and any `parents` SHAs must already exist in the repository.
Creates a comment on a specific commit, or on a specific line if `path` and `position` are provided.
Sets a commit's status (e.g., error, failure, pending, success from CI/CD) for a given SHA; max 1000 statuses per SHA/context.
Creates a custom role with defined permissions within a GitHub organization.
Creates a deploy key for a repository; the repository must exist and be accessible, and the provided key must be a valid public SSH key.
Creates a GitHub deployment for an existing repository, targeting a specific ref (branch, tag, or SHA) that must also exist within the repository.
Creates a deployment branch or tag policy for an existing environment in a GitHub repository, using a Ruby File.fnmatch pattern (where `*` doesn't match `/`) to specify which branches or tags are deployable.
Creates a status for an existing deployment, updating its operational state, associated URLs, and description.
Creates a new discussion post on a specific team's page within an organization.
Creates a new comment on an existing team discussion within a GitHub organization.
Creates a fork of an accessible repository, optionally into a specific organization, with a new name, or copying only the default branch.
Creates a new gist on GitHub with provided files, an optional description, and public/secret visibility.
Creates a new comment on a specified GitHub gist.
Use this action to complete the GitHub App Manifest flow (step 3 of 3) by exchanging the temporary authorization `code` for the app's full configuration, including credentials and private key. The code is provided via redirect URL after creating the app through GitHub's web interface and must be used within 1 hour.
Creates a GitHub Pages deployment for a repository using a specified artifact and OIDC token, provided GitHub Pages is enabled and the artifact (containing static assets) is accessible.
Configures or updates GitHub Pages for a repository, setting build type and source; ensure a Pages workflow exists for 'workflow' `build_type`, or `source_branch` exists for 'legacy' or unspecified `build_type`. This action allows users to effectively manage their GitHub Pages site settings, specifying how the site is built and where the source files are located.
Creates a new label in a specified GitHub repository, provided the repository exists and the user has write permissions.
Creates a milestone in a GitHub repository for tracking progress on issues or pull requests; requires repository existence and user write permissions.
Creates a repository autolink to automatically convert text references (e.g., 'TICKET-123') into hyperlinks, using a unique `key_prefix` and a `url_template` that includes `<num>`.
Creates an encrypted environment variable for a pre-existing environment within a GitHub repository; will fail if the variable name already exists.
Creates a new issue in a GitHub repository, requiring the repository to exist and have issues enabled; specific fields like assignees, milestone, or labels may require push access.
Creates a new comment on an existing GitHub issue or pull request within the specified repository.
Creates a new classic project board within a specified GitHub organization. Note: This action uses GitHub's Projects (classic) REST API. The classic projects feature may be disabled in some organizations, and GitHub recommends migrating to Projects V2 (accessible via GraphQL API) for new projects. Requirements: - The authenticated user must be an organization member with project creation permissions - Classic projects must be enabled for the organization - Requires 'repo' and 'admin:org' or 'write:org' scopes
Creates a new repository within a specified GitHub organization, with options for detailed configuration including visibility, features, merge strategies, initial commit, and templates.
Creates a new, uniquely named GitHub Actions variable for an organization, with configurable repository access visibility (all, private, or selected).
Creates a webhook for a GitHub organization to deliver event notifications to a configured URL.
Creates a project card in a GitHub project column (classic projects only). DEPRECATION NOTICE: GitHub Projects (classic) was sunset on August 23, 2024. This API only works with existing classic project columns. New classic projects cannot be created. Consider using GitHub Projects V2 (GraphQL API) instead. The request body must contain either: - `note`: A text note for the card - OR `content_id` AND `content_type`: To associate an issue or pull request
Creates a new column in a GitHub project (classic). DEPRECATION NOTICE: GitHub Classic Projects (V1) and its REST API were sunset on April 1, 2025. This action will return a 404 error on GitHub.com. For new projects, use GitHub Projects V2 which uses the GraphQL API instead. See: https://github.blog/changelog/2024-05-23-sunset-notice-projects-classic/
Creates a pull request in a GitHub repository, requiring existing `base` and `head` branches; `title` or `issue` must be provided.
Creates a NEW Git reference (branch or tag) in a repository. IMPORTANT: This action ONLY creates NEW references - if the reference already exists, it will fail with a 422 'Reference already exists' error. To update an existing reference, use the 'Update a reference' (GITHUB_UPDATE_A_REFERENCE) action instead. The repository must not be empty prior to this operation.
Generates a temporary (one-hour) registration token to add a new self-hosted runner to an organization for GitHub Actions.
Generates a time-limited token required to register a new self-hosted runner with a specific repository.
Creates a release in a GitHub repository for a specified tag; the tag must be unique for published releases, and if a `discussion_category_name` is given, it must already exist.
Generates a token, valid for one hour, to authenticate removing a self-hosted runner from an organization.
Generates a temporary (one-hour validity) token required to unregister and remove a self-hosted runner from a repository.
Posts a reply to a specific review comment on a GitHub pull request, requiring the repository, pull request, and original comment to exist, and a non-empty reply body.
Triggers a GitHub Actions workflow or a webhook on a repository by creating a repository dispatch event, allowing programmatic triggering of workflows based on events outside of GitHub.
Creates a new repository for the authenticated user, optionally within an organization if `team_id` is specified.
Publishes the specified codespace to a new repository, using the codespace's current state as the initial commit.
Creates a new GitHub Projects V2 project board linked to a specified repository. Note: This action uses GitHub's Projects V2 GraphQL API. The legacy Projects V1 REST API has been sunset by GitHub. The project is owned by the repository owner (user or organization) and linked to the specified repository.
Creates a uniquely named ruleset for a repository, defining rules for branches or tags with specified enforcement, conditions, and bypass actors.
Creates a new repository from an existing template repository; the authenticated user must have access to the template and, if creating in an organization, repository creation permissions within it.
Creates a new, unencrypted variable in a repository for GitHub Actions workflows; fails if a variable with the same name already exists.
Creates a webhook for a specified repository; requires admin permissions on the repository.
Creates a review comment on a pull request's diff, targeting a specific line, range of lines, an entire file, or replying to an existing comment.
Creates a pull request review, allowing approval, change requests, or comments; `body` is required if `event` is `REQUEST_CHANGES` or `COMMENT`, and omitting `event` makes the review `PENDING`.
Exchanges a user-to-server token for a new, fine-grained scoped access token for a GitHub App, requiring `client_id`, `access_token`, either `target` or `target_id`, and at least one permission; for repository-specific scoping, provide either `repositories` (names) or `repository_ids` (IDs), but not both.
Creates a snapshot of a repository's dependencies to populate the GitHub dependency graph and enable security alerts; `sha` must be a 40-character commit ID, `ref` a fully qualified Git reference (e.g., `refs/heads/main`), and `scanned` an ISO 8601 timestamp.
Creates an annotated Git tag object in a repository, pointing to an existing Git object (commit, tree, or blob) defined by its SHA and ensuring the `type` field correctly specifies the object's type.
DEPRECATED: This API was sunset on August 30, 2024. Use GITHUB_CREATE_A_REPOSITORY_RULESET instead to create tag protection rules via repository rulesets.
Creates a new team in an organization, optionally with maintainers, repositories, specific privacy, notification settings, or a parent team; if `parent_team_id` is given, `privacy` must be 'closed'.
Creates a temporary private fork of the specified repository to address a security vulnerability, linking the fork to a GHSA ID that must be specifically associated with this repository; the fork may take up to 5 minutes to become accessible.
Creates a new Git tree object in a repository, defining file/directory structure by specifying tree entries, optionally building on a `base_tree` SHA; all provided SHAs must be valid.
Creates a new GitHub Projects V2 project board for the authenticated user to organize and track issues, pull requests, and notes. Note: This action uses GitHub's Projects V2 GraphQL API. The legacy Projects V1 REST API has been sunset by GitHub.
Manually triggers a GitHub Actions workflow identified by `workflow_id` at a given `ref`, if the workflow is configured to accept `workflow_dispatch` events.
Enables commit signature protection for a specified branch, requiring all new commits to be signed.
Enables a custom deployment protection rule for an existing environment in a repository by linking a configured GitHub App (via `integration_id`) to control deployments.
Creates a draft issue item in a user-owned GitHub ProjectsV2. Use when you need to add a new draft item to track ideas or tasks in a user's project.
Tool to create chat completions using GitHub Models inference API. Use when you need to generate AI-powered text responses using models like GPT-4, Claude, or Llama through GitHub's inference endpoint.
Tool to create inference embeddings using GitHub's AI models. Use when you need to convert text into vector representations for similarity search, clustering, or other ML tasks.
Create a new issue type for a GitHub organization. Requires the authenticated user to be an organization administrator. OAuth tokens need admin:org scope.
Generates a temporary Just-In-Time (JIT) configuration for a new self-hosted GitHub Actions runner for a repository; any specified non-default `runner_group_id` must be an existing runner group accessible by the repository.
Creates a new environment or updates an existing one in a GitHub repository, allowing configuration of deployment protection rules such as wait timers and reviewers; ensure `environment_name` is URL-encoded if it contains special characters.
Creates or updates an environment secret with an `encrypted_value` that was encrypted using the public key identified by `key_id` for the specified environment.
Creates or updates an organization secret for GitHub Actions, requiring its value to be pre-encrypted via LibSodium using the organization's public key.
Creates or updates a GitHub Actions secret within a specific repository; use `encrypted_value` and `key_id` to set or change its value.
Creates or updates a Codespaces secret for the authenticated user; `encrypted_value` must be encrypted with the public key (ID: `key_id`) from GitHub's 'Get public key for the authenticated user' endpoint.
Creates new custom property schemas or updates existing ones in bulk for a specified organization; each property definition must include `property_name` and `value_type`.
Creates a new custom property (name must be unique for creation) or updates an existing one for an organization to define metadata for its repositories.
Creates a new file or updates an existing file in a GitHub repository; SHA can be provided to validate file updates, automatically fetched if not provided.
Tool to enable or update GitHub Pages configuration for a repository. Use when setting up GitHub Pages for static site deployment or modifying Pages settings like custom domains and HTTPS enforcement.
Creates or updates a Dependabot secret in a repository using an `encrypted_value` (pre-encrypted with LibSodium using the repository's Dependabot public key) and its corresponding `key_id`. This action allows you to securely manage secrets for a given repository, ensuring that sensitive data remains protected during the update process. By providing the encrypted value alongside the key ID, you can seamlessly maintain the necessary credentials for your repository's operations.
Creates an emoji reaction for a commit comment; if the user has already reacted with the same content, details of the existing reaction are returned.
Creates a reaction for a specified issue within a GitHub repository.
Creates a reaction for a specific comment on an issue within a GitHub repository.
Adds a specified reaction to a pull request review comment within a GitHub repository.
Creates an emoji reaction for a specific, existing release in a GitHub repository.
Creates a reaction for a team discussion within a GitHub organization.
Adds a reaction to a team discussion comment, requiring the specified organization, team, discussion, and comment to exist.
Tool to start a new GitHub sponsorship or reactivate a past sponsorship using GraphQL. Use when you need to sponsor a maintainer through GitHub Sponsors with a specified amount and privacy level.
Tool to create a new payment tier for your GitHub Sponsors profile using GraphQL. Use when you need to add a new sponsorship tier with a specific monthly price and description. The amount is specified in dollars and will be converted to cents automatically.
Creates or updates a Dependabot organization secret, requiring the secret value to be pre-encrypted with LibSodium using the organization's public key obtained from the 'Get an organization public key' endpoint.
Tool to create a new user list on GitHub. Use when you need to organize and group GitHub users for easier tracking and management.
Tool to create a new view in a user-owned GitHub project (Projects V2). Use when you need to add a customized view with specific layout, filters, and visible fields to organize project items. Note: This action works with GitHub Projects V2. The view can be configured with different layouts (table, board, roadmap) and optional filters. The visible_fields parameter is not applicable to roadmap layouts.
Declines a specific, pending repository invitation for the authenticated user, identified by its `invitation_id`.
Removes all user, team, and app-based access restrictions from a protected branch.
Removes admin enforcement from a protected branch (branch name cannot contain wildcard characters) in a repository.
Deletes a file by path from a GitHub repository. The file's blob SHA is automatically fetched if not provided.
Deletes an existing package version associated with the authenticated user.
Deletes an OAuth application grant for a user, which revokes ALL OAuth tokens and their associated authorizations for the application. This endpoint is only accessible to OAuth App owners and requires Basic Authentication using the OAuth App's client_id and client_secret.
Revokes a single OAuth access token for an OAuth App or GitHub App with OAuth authorization. IMPORTANT: This endpoint requires Basic Authentication using the OAuth App's client_id as username and client_secret as password. It CANNOT be called with personal access tokens, GitHub App installation tokens, or any other token type. You must be the OAuth App owner to use this endpoint.
Deletes a Git reference from a repository; 'ref' must be fully qualified (e.g., 'refs/heads/branch' or 'refs/tags/tag').
Permanently deletes a specific release, its assets, and potentially its associated Git tag from a repository.
Deletes a specific release asset from a GitHub repository; this action is idempotent.
Deletes a reaction from a GitHub release, provided the repository, release, and reaction exist.
Permanently deletes the specified repository; this is a destructive, irreversible action that requires admin privileges for the repository.
Deletes an active repository invitation, permanently revoking a user's access to collaborate on the specified repository.
Permanently deletes a repository ruleset.
Deletes a named GitHub Actions secret from a specified repository; this operation is destructive and idempotent, and requires the repository to exist.
Deletes the authenticated user's subscription to a specified repository if it exists, effectively 'unwatching' it.
Deletes a named variable (e.g., for GitHub Actions workflows) from a repository; the repository and the variable must already exist.
Deletes a specific webhook from a repository.
Deletes a specific pull request review comment.
Deletes a GitHub artifact by its ID within a repository, typically resulting in an empty response (HTTP 204 No Content) on success.
Deletes an existing Codespaces secret for the authenticated user by `secret_name`. This is a destructive and irreversible operation. Returns 404 if the secret does not exist.
Forces the removal of a self-hosted runner from a GitHub organization. This endpoint can be used to completely remove the runner when the machine you were using no longer exists. The runner will be immediately disconnected from GitHub Actions. Requires admin:org scope and organization admin access. Returns 204 No Content on successful deletion.
Removes a specific self-hosted runner (by `runner_id`) from a repository, if registered there; this is idempotent.
DEPRECATED: This API was sunset on August 30, 2024. Use GITHUB_DELETE_A_REPOSITORY_RULESET instead to manage tag protection rules via repository rulesets.
Deletes a team (and any child teams) from an organization.
Call this to mute a specific notification thread by deleting the user's subscription; notifications may still occur if the user is @mentioned, comments, or due to repository watch settings.
Deletes a specific autolink reference (which automatically links external resource IDs like JIRA-123 to URLs) from the specified repository.
Deletes a specific workflow run from a repository.
Removes all protection rules from a specific branch in a GitHub repository; the branch must currently have protection rules enabled.
Deletes a specific code scanning analysis by its ID from a repository; `confirm_delete` must be `true` if it's the last analysis of its type for a given tool and reference to prevent data loss.
Deletes a specific codespace owned by the authenticated user; this is a destructive action and the codespace must exist.
Deletes a specific commit comment, identified by its `comment_id`, from the specified repository; the comment must exist.
Deletes a reaction from a commit comment in a GitHub repository.
Disables GPG commit signature protection for a specific branch in a GitHub repository, meaning commits pushed to this branch no longer require GPG signing.
Deletes a custom organization role (which should not be actively assigned) by its ID; a 204 No Content response indicates success.
Deletes a specific Dependabot secret, identified by its name, from a given repository if both the repository and secret exist.
Deletes a specific deploy key from a repository; to change a key's properties or access scope, the existing key must be deleted and a new one created.
Permanently deletes a specified *inactive* deployment from a repository.
Deletes a specific deployment branch or tag policy, identified by its ID, from a given environment within a repository.
Deletes a specific team discussion, identified by its number, from an organization's team.
Deletes a specific comment from an existing team discussion within an organization, provided the specified organization, team, discussion, and comment all exist.
Sends an empty request body to `DELETE /user/emails` to attempt deletion of user email addresses; the API typically requires specific emails, so outcome may vary.
Deletes an existing deployment environment from an existing repository.
Deletes an existing and accessible secret from a specified environment within a GitHub repository, returning an empty dictionary on success or error details otherwise.
Deletes a named environment variable from a specified, existing environment within a GitHub repository.
Permanently deletes an existing GitHub gist, specified by its `gist_id`; this action is destructive and cannot be undone.
Deletes a specific comment from a GitHub Gist using its `gist_id` and `comment_id`.
Deletes a specific GitHub Actions cache from a repository using its unique `cache_id`.
Deletes the GitHub Pages site for the specified repository; completes without error if no site is currently enabled.
Permanently deletes a specific comment by its ID from an issue or pull request, if the repository exists and the comment ID is valid.
Deletes a reaction from an issue comment in a repository; the repository, comment, and reaction must exist.
Permanently removes a specific reaction from an issue in a GitHub repository.
Permanently removes an existing label from a repository.
Deletes the specified milestone if it exists; this operation is idempotent, typically returning a 404 if the milestone is not found or already deleted.
Deletes a GitHub organization and its repositories; this is a destructive action and the organization name will be unavailable for reuse for approximately 90 days.
Permanently deletes a secret from a GitHub organization, making it inaccessible to GitHub Actions workflows or other tools.
Deletes a named GitHub Actions variable from a specified organization.
Deletes a specific webhook, identified by `hook_id`, from an existing organization.
Permanently deletes a specific codespace belonging to a member of the specified organization.
Deletes a specific package in an organization; cannot delete public packages with over 5,000 downloads.
Permanently deletes a specific package owned by the authenticated user; public packages downloaded over 5,000 times cannot be deleted via this API.
Tool to delete a package version using GitHub GraphQL API. Use when you need to remove a specific version of a package by its global node ID.
Deletes a specific package version within an organization; requires admin permissions for packages with over 5,000 downloads.
Permanently and irreversibly deletes a specific version of a package owned by the specified user.
Deletes a pending (unsubmitted) review from a pull request; this is only possible if the review has not yet been submitted.
Deletes the specified GitHub project (Projects V2) using the GraphQL API. Note: This action uses GitHub's Projects V2 GraphQL API. The legacy Projects (classic) REST API was sunset on April 1, 2025 and is no longer available. The project is permanently deleted and cannot be recovered. The user must have admin permissions for the project to delete it.
Deletes a project card from a GitHub 'Project (classic)'; this operation is idempotent. DEPRECATION NOTICE: GitHub Classic Projects (V1) and its REST API were sunset on April 1, 2025. This action may return a 404 error on GitHub.com. For new projects, use GitHub Projects V2 which uses the GraphQL API instead. See: https://github.blog/changelog/2024-05-23-sunset-notice-projects-classic/
Deletes a project field (column) from a GitHub Projects V2 project using the GraphQL API. IMPORTANT: GitHub Classic Projects REST API was sunset on April 1, 2025. This action now uses the GitHub Projects V2 GraphQL API with the deleteProjectV2Field mutation. Note: The built-in Status field cannot be deleted as it is a core field in GitHub Projects V2. Only custom fields can be deleted.
Tool to delete a project item for a user in GitHub Projects V2. Use when you need to remove an item from a user's project. Requires the project item's GraphQL node ID (starts with 'PVTI_'). Uses the GitHub GraphQL API deleteProjectV2Item mutation.
Deletes a specific reaction from a pull request review comment, provided the comment and reaction exist on that comment within the specified repository.
Disables the requirement for pull request reviews before merging for a specific, existing branch in an existing repository; this action is idempotent and will succeed even if the protection is not currently enabled.
Deletes a specific Codespace secret from a repository by its name; this action is idempotent and will succeed even if the secret doesn't exist.
Deletes currently linked social media account URLs from the authenticated user's GitHub profile.
Deletes a reaction from a team discussion comment, given the organization name, team slug, discussion number, comment number, and reaction ID.
Permanently deletes a specific reaction from a team discussion within an organization.
Tool to delete a GitHub user list using GraphQL. Use when you need to remove a user list from a GitHub account.
Deletes a package owned by the specified user, requiring admin permissions for the authenticated user; deletion of public packages with over 5,000 downloads may require GitHub support.
Deletes all logs for a specific workflow run in a GitHub repository, provided the repository and run exist.
Disables a specific, currently active custom deployment protection rule for an existing environment within a GitHub repository.
Disables a specified workflow (by ID or filename) in a given GitHub repository, preventing new automatic triggers; any in-progress runs will continue.
Disables private vulnerability reporting for an existing GitHub repository, preventing direct private vulnerability reports to maintainers via GitHub's interface for this repository.
Removes a repository from the list of selected repositories enabled for GitHub Actions in an organization. Only works when the organization's `enabled_repositories` policy is set to `selected`. Requires admin:org scope.
Dismisses an APPROVED or CHANGES_REQUESTED review on a pull request with a mandatory explanatory message. IMPORTANT: Only reviews in APPROVED or CHANGES_REQUESTED state can be dismissed. Reviews in COMMENTED, PENDING, or already DISMISSED state will return a 422 error. To dismiss a review on a protected branch, you must be a repository admin or be authorized to dismiss pull request reviews.
Downloads a GitHub Actions workflow artifact as a ZIP file. Returns the artifact as a downloadable file. Use GITHUB_LIST_ARTIFACTS_FOR_A_REPOSITORY or GITHUB_LIST_WORKFLOW_RUN_ARTIFACTS to get valid artifact IDs first.
Downloads a repository's source code as a tarball (.tar.gz) archive for a specific Git reference, if the repository is accessible.
Downloads a repository's source code as a ZIP archive for a specific Git reference (branch, tag, or commit SHA). IMPORTANT SIZE LIMITATION: This action may fail with 'payload too large' errors for large repositories due to platform size restrictions. If you encounter size limit issues, consider these alternatives: - Use GITHUB_GET_REPOSITORY_CONTENT to fetch specific files or directories (also lists directory contents) - Clone the repository using git if you need the full codebase Best suited for: small to medium repositories, downloading specific tagged releases, or quick code inspection.
Downloads logs for a specific job in a GitHub Actions workflow run, contingent on the repository's existence and the job ID being valid and having produced logs.
Downloads a ZIP archive of logs for a specific workflow run attempt. Returns a downloadable ZIP file containing logs for all jobs and steps in the workflow run.
Downloads logs for a specific GitHub Actions workflow run as a ZIP archive containing log files for each job in the workflow.
Reactivates a currently disabled GitHub Actions workflow within a repository using its workflow ID or filename.
Sets the specific repositories that can use GitHub Actions within an organization by replacing the current list; only applies if the organization's Actions policy is 'selected repositories'.
Enables private vulnerability reporting for a repository, allowing security researchers to privately submit vulnerability reports to maintainers.
Adds a repository to the list of selected repositories enabled for GitHub Actions in an organization. Requires the organization's 'enabled_repositories' policy to be set to 'selected'.
Creates or updates a repository's development environment secret using an `encrypted_value` and its corresponding `key_id`; the secret must be pre-encrypted with the repository's Codespaces public key.
Creates or updates an organization's GitHub Codespaces secret using an encrypted value and its corresponding public key ID.
Triggers an export of a user's specified codespace, automatically stopping it if active, and returns its export status and download URL.
Exports the software bill of materials (SBOM) in SPDX JSON format for a repository, if its dependency graph is enabled and it has at least one commit.
Primary tool to find and search pull requests. Supports filtering by repository, author, state, labels, and merge status, and returns structured PR data for reliable use in workflows. GitHub search results are capped at ~1000 total items; narrow filters when totals approach this limit. `created_since`/`updated_since` filter on creation/update timestamps, not `merged_at`; apply merge-date filtering client-side.
AI-optimized repository search with smart filtering by language, stars, topics, and ownership. Builds intelligent search queries and returns clean, actionable repository data. Check `incomplete_results` in the response — when true, results are non-exhaustive. Search endpoints are rate-limited to ~30 requests/minute (vs. 5000/hour for general REST); apply backoff on 403/429. Total results are capped at ~1000 per query regardless of pagination.
Tool to follow a GitHub organization using GraphQL. Use when you need to make the authenticated user follow an organization.
Allows the authenticated user to follow the GitHub user specified by `username`; this action is idempotent and the user cannot follow themselves.
Tool to follow a GitHub user using GraphQL. Use when you need to make the authenticated user follow another user.
Forcefully cancels a queued or in-progress GitHub Actions workflow run, bypassing conditions like always() that would otherwise continue execution. Only use when the standard cancel endpoint fails. Cannot cancel completed workflow runs. Requires write permissions to the repository.
Forks a specified public gist, creating a copy under the authenticated user's account.
Generates Markdown release notes content (listing changes, pull requests, and contributors) for a GitHub repository release, customizable via tags and a configuration file.
Retrieves the raw, typically Base64-encoded, content of a file (blob) from a GitHub repository using its SHA hash, if the repository and blob SHA exist.
Retrieves detailed information for a specified branch within a GitHub repository.
Lists users, teams, and GitHub Apps with push access to a branch; this branch must be protected in repository settings for detailed restrictions, otherwise expect a 404 or empty response.
Retrieves a specific commit from a repository by its owner, name, and a valid commit reference (SHA, branch, or tag), supporting pagination for large diffs.
Checks if repository administrators are subject to the branch protection rules on a specific branch.
Retrieves all officially supported, date-based (e.g., "2022-11-28") versions of the GitHub REST API from the /versions endpoint.
Retrieves commit activity (total commits, weekly additions/deletions/commits) for all contributors to a repository; may require a retry if GitHub returns 202 while preparing data.
Lists all enabled custom deployment protection rules for a specific environment in a repository; the environment must exist and be configured for deployments.
Retrieves detailed information for a specific milestone within a GitHub repository by its number.
Retrieves publicly available information for an existing GitHub App, identified by its unique URL-friendly `app_slug`.
Gets a specific artifact for a repository by `artifact_id`. This action retrieves the details of a specific artifact from a GitHub repository using the artifact's unique identifier. It allows users to access information about artifacts stored in the repository.
Retrieves detailed information for a specific GitHub Classroom assignment if the authenticated user is an administrator of the classroom.
Retrieves a specific autolink reference (which automatically hyperlinks text like 'JIRA-123' to an external system) for a repository using its unique ID; requires administrator access to the repository.
Retrieves the details of a specific deployment environment for a given repository, including its name, configurations, and current status.
Retrieves the public key for a specified GitHub repository environment, used to encrypt secrets for GitHub Actions.
Retrieves metadata (name and timestamps) for a single secret in a GitHub Actions environment. Note: The actual secret value is never returned by this API for security reasons.
Retrieves a specific environment variable from a GitHub Actions environment by repository owner, repository name, environment name, and variable name.
Retrieves detailed information about a specific issue in a repository using the owner, repository name, and issue number.
Action to get an issue comment.
Fetches details of a specific issue event for a given repository and event ID.
Get an organization
Action for `GetAnOrganizationPublicKey`.
Retrieves a specific GitHub organization role by its ID.
Gets an organization secret's metadata (e.g., name, creation/update dates, visibility), but not its encrypted value.
Retrieves details (name, value, visibility, timestamps) of a specific, existing variable for an existing GitHub organization.
Retrieves the full configuration, including subscribed events and delivery settings, for an existing organization webhook.
Retrieves a specific package (by type and name) from an organization, if both the package and organization exist.
Retrieves metadata for a specific package owned by a GitHub user, using package type, name, and username as identifiers.
Retrieves detailed information for a specific package owned by the authenticated user.
Retrieves detailed information for a specific version of a package within an organization.
Retrieves a specific public package version associated with a GitHub user.
Retrieves detailed information for an existing specific package version associated with the authenticated user, identified by its type, name, and version ID.
Retrieves detailed information for a specific GitHub project (V2) using its project number and owner. Note: This action uses GitHub's Projects V2 REST API. The legacy Projects (classic) REST API was sunset on April 1, 2025. The project is identified by its number (visible in the project URL) and owner (either a username or organization name). If no owner is specified, the authenticated user is assumed.
Retrieves all details of a specific project card, given its unique `card_id`. DEPRECATION NOTICE: GitHub Projects (classic) REST API was sunset on April 1, 2025. This action only works with existing classic project cards that were created before the sunset date. For new projects, use GitHub Projects V2 (GraphQL API) instead.
Retrieves detailed information for a specific project column from GitHub Projects (classic). DEPRECATION NOTICE: GitHub Classic Projects (V1) and its REST API were sunset on April 1, 2025. This action will return 404 for most requests on GitHub.com. However, it may still work on GitHub Enterprise Server instances where classic projects are enabled. For new projects, use GitHub Projects V2 which uses the GraphQL API instead. See: https://github.blog/changelog/2024-05-23-sunset-notice-projects-classic/ Returns column details including: id, name, url, project_url, cards_url, node_id, created_at, and updated_at timestamps.
Retrieves a specific pull request from a GitHub repository using its owner, repository name, and pull request number.
Retrieves a specific Git reference (e.g., a branch, tag, or fully qualified like 'heads/main') from a GitHub repository. The reference must exist in the repository; use 'list_matching_references' first if unsure what references are available.
Gets a specific release from a GitHub repository, provided the repository is accessible and the release exists.
Gets metadata for a specific release asset in a GitHub repository, including a `browser_download_url` for downloading the asset.
Gets a release from a GitHub repository by its tag name; the repository and a release with this tag must already exist.
Retrieves detailed information about an existing and accessible GitHub repository.
Gets a repository's public key for encrypting secrets to be used in GitHub Actions, if the repository exists and is accessible.
Fetches the README file (if it exists and is accessible) from a specified GitHub repository, returning its Base64-encoded content and metadata.
Retrieves the README file from a specified directory within a GitHub repository, optionally at a given commit, branch, or tag.
Retrieves a specific repository ruleset by its ID; if `includes_parents` is true, the search for this `ruleset_id` also extends to rulesets from parent organizations.
Gets detailed information for a specific repository rule suite by its ID, including its evaluation status and the results of its individual rules.
Gets metadata (name, creation/update timestamps) for an existing repository secret, excluding its encrypted value.
Gets the authenticated user's subscription details for a repository, indicating if they receive notifications.
Gets a specific GitHub Actions variable by name from an accessible repository.
Returns the configuration of an existing webhook for a given repository.
Retrieves a specific pull request review comment by its ID, provided the repository exists, is accessible, and the comment ID is valid.
Retrieves a specific review for a pull request using its owner, repository, pull request number, and review ID.
Retrieves metadata (name, timestamps, visibility; not the value) for a specific, existing development environment secret associated with the authenticated user's GitHub Codespaces.
Retrieves detailed information about a specific self-hosted runner registered within a GitHub organization.
Gets a specific self-hosted runner for a repository by its unique ID.
Retrieves all grades for an existing GitHub Classroom assignment.
Retrieves detailed information for a specific Git tag object from a GitHub repository, using the SHA of the tag object itself.
Retrieves a GitHub team by its slug from a specific organization.
Retrieves a specific GitHub notification thread using its unique `thread_id`.
Retrieves the authenticated user's subscription details for a specific notification thread, identified by `thread_id`.
Browse and list all files/directories in a GitHub repository. Efficiently retrieves the complete repository structure in a single API call when used with recursive mode. Perfect for analyzing codebase structure, finding specific files, or getting an overview of repository contents without cloning.
Retrieves the public profile information for an existing GitHub user, specified by their username.
Retrieves the configuration for a specific webhook associated with a GitHub organization.
Returns the configuration for an existing webhook on the specified repository.
Returns detailed information for a specific delivery attempt of a webhook configured for the specified GitHub organization.
Retrieves detailed information for a specific GitHub Actions workflow in a repository, identified by either its numeric ID or its filename.
Gets a specific workflow run by its ID from a GitHub repository.
Retrieves detailed information for a specific attempt of a workflow run in a GitHub repository, including its status, conclusion, and timings.
Retrieves the billing usage report for a specified GitHub user. Use when you need to analyze billing costs and usage patterns.
Retrieves branch protection settings for a specific, existing, and accessible branch in a GitHub repository; protection feature availability varies by GitHub product plan.
Tool to retrieve the list of AI models available in the GitHub Models catalog. Use when you need to discover available models, their capabilities, token limits, and supported modalities.
Retrieves detailed information for a specific check run within a GitHub repository.
Retrieves a specific check suite (a collection of check runs) by its ID from a repository accessible to the authenticated user.
Retrieves details for a specific GitHub Classroom. Requires the authenticated user to be an administrator of the classroom.
Retrieves the full details of a specific GitHub code of conduct using its unique key.
Tool to look up a code of conduct by its key using GitHub's GraphQL API. Use when you need to fetch code of conduct details as part of a GraphQL workflow.
Gets an existing CodeQL database (including a download URL) for a specified language in an accessible repository, if one has been successfully built for that language.
Retrieves a specific code scanning alert, which identifies potential code vulnerabilities or errors, by its number from the specified GitHub repository.
Retrieves detailed information for a specific code scanning analysis on an accessible repository, identified by its `analysis_id`.
Gets the default setup configuration for code scanning in a repository, including state, languages, query suite, and schedule for a repository if it exists.
Call to retrieve detailed information for a `codespace_name` belonging to the authenticated user, ensuring the codespace exists and is accessible.
Fetches commit authors identified during a repository import, used to map authors from an external VCS to GitHub accounts. NOTE: This endpoint has been deprecated by GitHub as of April 12, 2024, and is no longer available. The Source Imports REST API has been retired due to very low usage levels. Please use the GitHub Importer tool at https://github.com/new/import for repository imports.
Retrieves the full details of a specific commit comment in a GitHub repository, using its unique identifier.
Retrieves detailed information (including author, committer, message, tree, parents, verification) for a specific commit in a GitHub repository, identified by its SHA.
Gets the commit signature protection status for a branch in a repository.
List all statuses for a commit reference (SHA, branch, or tag) in reverse chronological order. Use when you need to check CI/CD status results from various systems for a specific commit.
Retrieves a repository's community profile metrics, including health percentage and the presence of key community files (e.g., README, LICENSE).
Gets contextual hovercard information for a GitHub user; `subject_type` and `subject_id` can be jointly provided for more specific details.
Retrieves a specific custom deployment protection rule (used by GitHub Apps for external validation or manual approval of deployments) for a given environment in a repository.
Get pre-flight data (e.g., default location, devcontainer path) for creating a Codespace in a given repository (must exist and be accessible), optionally for a specific Git ref.
Gets the default GITHUB_TOKEN workflow permissions and settings for a GitHub organization.
Gets the default workflow permissions (`read` or `write`) for the GITHUB_TOKEN and whether it can approve pull request reviews in an existing and accessible repository.
Gets the dependency diff between two Git revisions in a repository, where 'basehead' specifies the revisions and 'name' can optionally scope to a specific manifest file.
Gets a specific deploy key, identified by its `key_id`, for the GitHub repository specified by `owner` and `repo`.
Gets a specific deployment by ID from a repository, provided the repository and deployment ID exist.
Retrieves a specific deployment branch policy for an environment in a repository, identified by its unique ID.
Retrieves a specific deployment status by its ID for a given deployment within a GitHub repository.
Retrieves detailed information about a specific export of a codespace.
Fetches a specific discussion by its number from a team within an organization. This is a read-only action that retrieves discussion details including title, body, author information, comment count, and reactions. The authenticated user must be a member of the organization to access team discussions.
Fetches a specific comment from a team discussion within a specific organization.
Lists all emojis available for use on GitHub, including custom and Unicode emojis.
Tool to look up a pending enterprise unaffiliated member invitation by invitee and enterprise. Use when you need to check the status of a specific invitation.
Fetches a list of available GitHub feed URLs for the authenticated user.
Fetches a specific GitHub gist by its `gist_id`, returning comprehensive details if the gist exists.
Retrieves a specific Gist comment by its ID and the Gist's ID.
Retrieves a specific revision of a gist.
Retrieves total GitHub Actions cache usage statistics for an organization, including active cache count and size across all repositories.
Retrieves the total count of active GitHub Actions caches and their combined size in bytes for a specified repository.
Gets the GitHub Actions permissions for a specified organization, detailing repository enablement and allowed actions policies.
Gets the GitHub Actions permissions policy for a repository, including its enabled status and the scope of allowed actions.
Tool to get billing premium request usage report for a GitHub user. Use when you need to retrieve usage data for premium features like Copilot or AI models.
Tool to retrieve billing usage summary for a GitHub user account. Use when tracking usage costs, monitoring billing details, or generating usage reports for a specific user. Note: This endpoint only returns data for the past 24 months and is currently in public preview.
Fetches GitHub's publicly available metadata, useful for configuring network security policies or IP allow-listing.
Retrieves detailed information about a specific GitHub Pages build for a repository, which must have GitHub Pages enabled.
Retrieves a specific .gitignore template from GitHub by its name, which must be an existing template in GitHub's collection.
Retrieve a global GitHub security advisory by its GHSA identifier. Use this to get detailed information about vulnerabilities including severity, affected packages, CVSS scores, and references.
Tool to fetch any GitHub object by its global node ID. Use when you have a node_id and need to retrieve the corresponding object details.
Tool to retrieve the authenticated client's GitHub GraphQL API rate limit information. Use when you need to check remaining quota, current usage, or reset time for GraphQL requests.
Retrieves detailed information, including processing status and results URL, about a specific SARIF (Static Analysis Results Interchange Format) upload for a repository, uniquely identified by its sarif_id.
Retrieves interaction restrictions for an organization, showing which GitHub user types can interact with its public repositories and when restrictions expire; returns an empty response if no restrictions are set.
Retrieves active interaction restrictions for a repository, detailing which user groups are limited from activities like commenting or creating pull requests, and when these restrictions expire.
Retrieves currently active interaction restrictions for the authenticated user's public repositories.
Retrieves a specific label by its name from a specified GitHub repository.
Lists files larger than 100MB identified during a previous source import for the specified repository. NOTE: This endpoint has been deprecated by GitHub as of April 12, 2024, and is no longer available. The Source Imports REST API has been retired due to very low usage levels. Please use the GitHub Importer tool at https://github.com/new/import for repository imports.
Retrieves information about the most recent GitHub Pages build for a repository, which must exist, be accessible, have GitHub Pages enabled, and have at least one prior build.
Call this action to retrieve comprehensive details for a specific software license recognized by GitHub, using its unique license key.
Tool to look up an open source license by its SPDX ID using GitHub's GraphQL API. Use when you need to fetch license details for compliance tracking or repository setup.
Fetches an ASCII art representation of GitHub's Octocat, suitable for text-based displays.
Retrieves the OpenID Connect (OIDC) subject claim customization template for a repository, which defines the `sub` claim structure in OIDC tokens for GitHub Actions workflows; returns the default configuration if no customization is applied.
Gets the list of allowed actions and reusable workflows for an organization when the 'allowed_actions' policy is set to 'selected'.
Tool to retrieve an organization's audit log events for security and compliance investigations. Use when tracking organizational changes, security audits, or compliance monitoring. Requires organization owner permissions and read:audit_log scope.
Retrieves the definition (schema) of a specific, existing custom property for an organization.
Tool to get an item from an organization-owned GitHub Projects V2 project. Use when you need to retrieve details about a specific project item including its content, fields, timestamps, and creator information.
Retrieves an organization's public key, which must be used to encrypt secret values before they are configured for Codespaces.
Retrieves the public key for an existing GitHub organization, required for encrypting Dependabot secrets. Requires admin:org scope.
Retrieves metadata for a specific secret available to an organization's GitHub Codespaces without exposing its encrypted value.
Retrieves the OpenID Connect (OIDC) subject claim customization template for a GitHub organization, which defines how the `sub` claim in OIDC tokens for workflows is constructed.
Retrieves the DNS health check status (e.g., CNAME/A records, HTTPS) for a GitHub Pages site; the check may be pending (HTTP 202) on initial calls or after site changes.
Retrieves information for a GitHub Pages site, which must be enabled for the repository.
Retrieves page view statistics for a repository over the last 14 days, including total views, unique visitors, and a daily or weekly breakdown.
Retrieves pending deployment environments for a specific workflow run that are awaiting approval due to protection rules.
Retrieves permission information for a GitHub project (classic) collaborator. Returns the permission level and full user object for a collaborator on a GitHub project (classic). The permission returned can be admin, write, read, or none.
Retrieves a repository's public key for encrypting GitHub Codespaces secrets; requires `repo` scope or equivalent read access to codespaces secrets for private repositories.
Retrieves the authenticated user's public key for encrypting GitHub Codespaces secrets. The returned key must be used with libsodium sealed box encryption before creating or updating secrets via the API.
Retrieves the pull request review protection settings for a specific branch in a GitHub repository, if such protection is configured.
Retrieves the authenticated user's current GitHub API rate limit status, including usage and limits across different resource categories.
Tool to fetch raw file content from a GitHub repository. Returns raw bytes in whatever format the file uses (JSON, CSV, binary, etc.) — parsing and validation are the caller's responsibility. Ensure owner, repo, ref, and path are consistent when combining with other GitHub tools to avoid mismatched-ref errors.
Gets the settings for allowed actions and reusable workflows in a repository. Requires the repository's `allowed_actions` policy to be set to `selected` (returns 409 if set to `all` or `local_only`).
Gets metadata (name, creation/update timestamps) for a specific, existing development environment secret (Codespaces secret) in a repository, without exposing its value.
Tool to retrieve attestations by subject digest from a GitHub repository. Use when you need to verify or check attestations for a specific artifact identified by its SHA256 digest.
Retrieves the total number of clones and a breakdown of clone activity (daily or weekly) for a specified repository over the preceding 14 days.
Retrieves a file's Base64 encoded content or lists a directory's contents from a GitHub repository.
Tool to lookup a repository by owner and name using GitHub's GraphQL API. Use when you need comprehensive repository information.
Tool to lookup a repository owner (User or Organization) by login using GitHub's GraphQL API. Use when you need to determine whether a login is a user or organization and retrieve basic profile information.
Retrieves a specific user's permission level ('admin', 'write', 'read', or 'none') for a given repository, where 'maintain' role is reported as 'write' and 'triage' as 'read'.
Gets a repository's public key, used to encrypt secrets for Dependabot.
Retrieves metadata for an existing Dependabot secret in a repository, without exposing its encrypted value.
Tool to retrieve a repository security advisory using its GHSA identifier. Use when you need detailed information about a specific security vulnerability.
Retrieves a specific delivery for a repository webhook, identified by its `hook_id` and `delivery_id`.
Retrieves all active rules for a specific branch in a GitHub repository, excluding rules in 'evaluate' or 'disabled' status.
Gets a single organization Dependabot secret's metadata (name, timestamps, visibility) without revealing its encrypted value. Requires admin:org scope.
Retrieves the status check protection settings for a specific branch in a GitHub repository, if status check protection is enabled for it.
Retrieves a user's role and membership status within a specific team in an organization. Returns membership details including role ('member' or 'maintainer') and state ('active' or 'pending'). If the user is not a member of the team, returns is_member=False with a descriptive message. Requires the authenticated user to be an organization member with visibility into the team.
Lists teams with explicit push access to a protected branch, provided team restrictions are configured in the branch's protection settings; returns an empty list otherwise.
Gets the profile information for the currently authenticated GitHub user, including potentially private details based on user settings.
Retrieves the aggregated commit status (e.g., success, failure, pending) from all checks for a specific reference (SHA, branch, or tag) in a GitHub repository.
Retrieves the 'punch card' data, showing hourly commit counts for each day of the week for an existing and accessible repository.
Fetches weekly commit totals and daily commit counts for the last 52 weeks for a specified GitHub repository.
Fetches the latest official (non-prerelease, non-draft) release for a GitHub repository; requires at least one such published release.
Retrieves the license file and its details for a repository, optionally from a specific Git reference (branch, tag, or commit SHA).
Retrieves the detailed approval history for a specific workflow run in a GitHub repository, detailing each review's environment, state, reviewer, and comments, to track the approval process for workflows, particularly automated deployments.
Retrieves the status of a specific GitHub Pages deployment for a repository, which must have GitHub Pages enabled.
Fetches the weekly commit activity (additions and deletions per week) for a repository over the past year; best for repositories with under 10,000 commits.
Retrieves the weekly commit count for a repository, detailing commits by the owner and all contributors over the last 52 weeks; GitHub may return a 202 status or an empty response if statistics are being computed.
Retrieves a random quote from GitHub's 'Zen of GitHub' collection, reflecting GitHub's design philosophies and offering humorous insights, useful for displaying GitHub wisdom or a lighthearted message.
Fetches the top 10 most viewed content paths for a repository from the last 14 days.
Fetches the top 10 websites that referred traffic to a repository within the last 14 days.
Retrieves a GitHub user's profile information by their unique numeric account ID. Use when you know the user's numeric ID rather than their username.
Tool to get an item from a user-owned project in GitHub Projects V2. Use when you need to retrieve details about a specific item (issue, pull request, or draft issue) in a user's project board.
Tool to get attestations by subject digest for a GitHub user. Use when you need to retrieve attestation data for a specific artifact or resource identified by its subject digest.
Tool to list GitHub Projects v2 for a specified user. Use when you need to retrieve all projects owned by a user with pagination support.
Lists users with explicit push access to a protected branch, provided its protection rule restricts pushes to specific users.
Tool to retrieve the authenticated user's profile information via GitHub GraphQL. Use when working with GraphQL queries or need viewer details in GraphQL format.
Gets the access level settings for a private repository, determining how workflows outside this repository can use its actions and reusable workflows.
Retrieves detailed information for a specific job within a GitHub Actions workflow run, given its `job_id` which must be valid for the specified repository's workflow.
Gets the billable time, in milliseconds, for a specific workflow run, detailing time spent on various operating systems.
Gets the billable time (in milliseconds, broken down by runner OS) for a specific workflow within a repository for the current billing cycle.
Use to determine if the authenticated user has starred a specific GitHub repository, which is confirmed by an HTTP 204 status (resulting in an empty dictionary in the response data); the action fails (e.g., HTTP 404) if the repository is not starred or does not exist.
Lists accepted assignments (student repositories created after acceptance) for an existing GitHub Classroom assignment, identified by its unique `assignment_id`.
Lists repositories that the authenticated user can access through a specific GitHub App installation. Returns repositories where the user has explicit :read, :write, or :admin permission through the installation. The response includes permission details for each repository. Prerequisites: - Requires a GitHub App user access token (not a standard OAuth token) - Use GITHUB_LIST_APP_INSTALLATIONS first to get valid installation IDs
Lists GitHub App installations accessible to the authenticated user via their access token, including installation details, permissions, and repository access.
Lists GitHub Apps with push access to a repository's protected branch.
Lists GitHub Actions workflow artifacts for a specified repository, which must exist.
Lists users who can be assigned to issues in a repository, typically those with push access.
Lists all assignments for a given GitHub Classroom `classroom_id`; the classroom must exist and be accessible.
Tool to list attestation repositories for an organization. Use when you need to discover which repositories in an organization have attestations. Attestations provide verifiable metadata about software artifacts.
Lists machine types available for GitHub Codespaces in a repository, optionally using a Git ref to check compatibility based on prebuild availability and devcontainer configurations.
Lists branches for an existing GitHub repository, with an option to filter by protection status.
Lists branches in an accessible repository where the provided commit SHA is the head, useful for identifying development lines based on that commit.
Lists annotations for a specific check run in a GitHub repository, detailing issues like errors or warnings on particular code lines.
List GitHub check runs for a commit SHA, branch, or tag to assess CI status and conclusions. Use when you need reliable CI pass/fail signals beyond commit metadata.
Lists check runs for a specific check suite in a GitHub repository, optionally filtering by check name or status.
Lists check suites for a Git reference (commit SHA, branch, or tag) in a repository, optionally filtering by GitHub App ID or check run name.
Lists the immediate child teams of a parent team within an organization.
Lists GitHub Classrooms to which the authenticated user has administrative access.
Lists syntax errors in a repository's CODEOWNERS file, which must be located at the root, `.github/`, or `docs/` directory for the specified ref.
Lists all CodeQL databases for a repository where CodeQL analysis has been previously run and completed.
Lists code scanning alerts for a GitHub organization; use EITHER `tool_name` OR `tool_guid` if filtering by tool, not both.
Lists code scanning alerts for a repository, optionally filtering by tool (which must have produced scan results for the repository), Git reference, state, or severity.
Lists code scanning analyses for an existing repository, optionally filtering by tool (name or GUID), Git reference, or SARIF ID.
Retrieves all available codes of conduct from GitHub, often used to select one for a repository.
Tool to fetch all available codes of conduct using GitHub's GraphQL API. Use when you need to retrieve the complete list of codes of conduct that can be applied to repositories.
Lists all GitHub Codespaces owned by a specified member of a given organization.
Lists GitHub Codespaces for the authenticated user, optionally filtering by repository ID and supporting pagination.
Lists active/pending GitHub Codespaces for an existing organization; admins list all, members list their own.
Tool to list issue and PR comment changes across an organization's repositories efficiently. Use when monitoring comment activity without per-PR/per-issue polling. Filters organization events to return only comment-related events (IssueCommentEvent, PullRequestReviewCommentEvent, CommitCommentEvent). Note: Events are limited to the past 30 days and up to 300 events per timeline. Use ETag header for efficient polling to avoid rate limits.
Lists all comments for a specific review on a GitHub pull request.
Retrieves all comments for a specific commit in a GitHub repository, supporting pagination.
Lists all commit comments for a specified repository, which must exist and be accessible.
Lists commits for a GitHub repository. Requires 'owner' (username/org) and 'repo' (repository name) parameters. Optionally filter by SHA/branch, path, author, committer, or date range.
Lists commits for a pull request; requires the repository and pull request to exist and be accessible, and supports pagination.
Retrieves a list of commonly used software licenses from GitHub, optionally filtering for 'featured' licenses whose specific selection criteria by GitHub may vary.
Gets the schema definitions for all custom properties configured for an organization, not the specific values assigned to repositories.
Gets all custom property values for a repository. Custom properties are defined at the organization level, so this endpoint works with organization-owned repositories. Returns an empty array if no custom properties are set.
Lists repositories in an organization with their custom property values. Requires 'Custom properties' organization permission (read).
Retrieves a list of webhook deliveries for a specific webhook in an organization, allowing inspection of delivery history and details.
Retrieves delivery attempts for a specific repository webhook to inspect its history; ensure the webhook ID exists.
Lists deploy SSH keys for a specified repository; the repository must exist.
Lists all deployment branch policies for a specified environment in a GitHub repository.
Lists deployments for a specified repository; repository must exist.
Lists all statuses for a given deployment in a repository.
Lists all comments for a specific team discussion within an organization. Note: Team discussions are deprecated as of 2023-11-28. Consider using GitHub Discussions instead. This endpoint requires the authenticated user to be a member of the organization and have access to the team's discussions.
Lists discussions for a specific team within an organization, with options for sorting, pagination, and filtering by pinned status. Note: Team discussions are deprecated as of 2023-11-28. Consider using GitHub Discussions instead. This endpoint requires the authenticated user to be a member of the organization and have access to the team's discussions.
Lists all email addresses for the authenticated user, including their primary status, verification status, and visibility. This action retrieves the complete list of email addresses associated with the authenticated user, providing important details such as which email is primary and whether the emails are verified.
Lists all custom deployment protection rule integrations for a repository environment; the `environment_name` must be URL-encoded.
Retrieves all deployment environments for a specified repository, which are used to configure protection rules and secrets for different software lifecycle stages.
Lists the names and metadata (not values) of secrets for a specified, existing environment within an existing GitHub repository.
Lists all environment variables, which are plaintext key-value pairs for GitHub Actions workflows, for a specified environment within a GitHub repository.
Lists public events for the specified GitHub user, or private events if authenticated as that user, in reverse chronological order.
Lists events a specific GitHub user received from followed users and watched repositories; returns private events if authenticated for `username`, otherwise public.
Lists followers for a specified, existing GitHub user.
Lists users following the authenticated GitHub user, returning an empty list if the user has no followers.
Lists forks for a specified repository, which must exist, with options for sorting and pagination.
Lists comments for a specified GitHub Gist.
Lists all commits for a specified gist.
Lists all forks for a given GitHub gist ID.
_lists public gists for a specified GitHub user._
Lists gists for the authenticated user, with optional filtering by update time and pagination.
Lists GitHub Actions caches for a repository, with options to filter by Git reference or cache key, and to sort and paginate results.
Lists GitHub Pages builds for a repository; GitHub Pages must be enabled on the repository for builds to be listed.
Retrieves all available .gitignore template names from GitHub (e.g., 'Python', 'Node', 'Java'), used for generating .gitignore files.
Lists GitHub's global security advisories, filterable by various attributes including ID, type, ecosystem, severity, and dates.
Tool to list GPG keys for a GitHub user. Use when you need to fetch the public GPG keys associated with a specific GitHub user account.
Lists pending installation requests made by users or organizations for the authenticated GitHub App.
Lists all instances of a specific code scanning alert, optionally filtered by Git ref; requires code scanning to be enabled on the repository.
Lists comments for a specified issue in a GitHub repository.
Lists issue comments, including those on pull requests, for an accessible repository.
Tool to list dependencies an issue is blocked by. Use when you need to retrieve all issues that are blocking a specific issue from being closed or completed.
Tool to list dependencies an issue is blocking. Use when you need to see which issues are blocked by a specific issue.
Retrieves a list of all events for a specific issue within a GitHub repository.
Lists all issue events (e.g., closed, reopened, assigned) for a specified repository.
Lists GitHub issues for the authenticated user across visible repositories, with filtering by user relationship, state, labels, an ISO 8601 `since` timestamp (YYYY-MM-DDTHH:MM:SSZ), and sorting options; pull requests are typically included.
List all issue types configured for a GitHub organization. Requires read:org scope for OAuth tokens.
Lists jobs for a specific workflow run in a GitHub repository.
Lists jobs, including details like ID, status, and steps, for a specific attempt of a GitHub Actions workflow run.
Lists all labels for a specified issue in a GitHub repository.
Retrieves all labels for a specified, existing GitHub repository.
Lists all labels assigned to a specific self-hosted runner registered with the given repository.
Lists all labels for issues within a specific milestone in a repository.
Lists all labels assigned to a specific self-hosted runner within a GitHub organization, which are used to route workflows.
Tool to fetch all known open source licenses using GitHub's GraphQL API. Use when you need to retrieve the complete list of licenses that can be applied to repositories.
Lists available machine types for a specific, accessible codespace, enabling it to be transitioned to a new hardware configuration.
Lists all Git references (branches or tags) in a repository that start with the provided partial reference path (e.g., `heads/my-feature` or `tags/v1.2`).
Lists milestones, which track progress for groups of issues and pull requests, for an existing repository, allowing filtering by state and sorting.
Tool to list notification threads for the authenticated user with efficient polling support. Use when you need to fetch the user's GitHub notification inbox with filters like unread/participating/since. Returns notification threads plus polling headers (Last-Modified, ETag, X-Poll-Interval) for efficient polling. IMPORTANT: This endpoint requires a Personal Access Token (classic) with 'notifications' or 'repo' scope. It does NOT work with GitHub App tokens or fine-grained personal access tokens. If the token type is incompatible, a clear error message will be returned.
DEPRECATED: Use GITHUB_LIST_NOTIFICATIONS instead. Lists notifications for the authenticated user, sorted by most recent update, with filtering and pagination options.
Lists all Codespaces secrets available for a specified organization, which must exist.
Lists public events in a specified GitHub organization for the authenticated user's organization dashboard. Returns activities like repository pushes, pull requests, issues, forks, and other public events within the organization. The authenticated user must be a member of the organization to see events.
Lists public and concealed members of a GitHub organization; viewing concealed members requires authenticated user to be an organization member.
List organization memberships for authenticated user
Lists projects (V2) for a specified GitHub organization, with optional search query and cursor-based pagination.
Retrieves a list of repositories for a specified GitHub organization, allowing filtering by type and sorting.
Lists all custom organization roles for an existing GitHub organization.
Lists GitHub organizations for the authenticated user, sorted by ID in ascending order.
Lists GitHub Actions secrets available for a specified organization.
Lists public organizations for a specified GitHub user; the `username` must be a valid GitHub handle.
Lists organizations the authenticated GitHub user is a member of, returning details for each organization.
Lists all GitHub Actions variables for a specified organization.
Lists all webhooks for a specified GitHub organization; the organization must exist.
Lists all fine-grained permissions available in a GitHub organization for use in custom organization roles. These permissions define granular access controls that can be combined when creating custom roles. Note: This endpoint requires GitHub Enterprise Cloud with the custom organization roles feature enabled. The authenticated user must be an administrator or have the 'read_organization_custom_org_role' permission.
Lists issues for the authenticated user within a specified GitHub organization, with options to filter by involvement type, state, labels, and to sort results.
Lists all versions for a specified package, if it exists and is owned by the given GitHub organization.
Tool to list items for an organization project view. Use when you need to retrieve all items from a specific view within a GitHub organization's Projects V2 project. Returns a list of project items with their content, metadata, and field values.
Lists the selected repositories that are enabled for GitHub Actions in an organization. This endpoint only returns results when the organization's 'enabled_repositories' permission policy is configured to 'selected'. Requires admin:org scope and organization admin permissions.
Lists approved fine-grained personal access tokens (PATs) with access to resources in a GitHub organization, optionally filtering by owner, repository, permissions, or last usage time. AUTHENTICATION REQUIREMENT: This endpoint requires GitHub App authentication with 'Personal access tokens' organization permissions (read). Standard personal access tokens CANNOT use this endpoint. The GitHub App must also have access to the organization.
Lists requests from organization members to access organization resources with fine-grained personal access tokens (pending, approved, or denied). Note: This endpoint requires GitHub App authentication with 'organization_personal_access_token_requests:read' permissions; it cannot be used with personal access tokens.
Lists all Dependabot secrets (metadata like names, creation/update timestamps, but not their encrypted values) for a specified organization, which must exist.
Lists outside collaborators for a GitHub organization, with options to filter (e.g., by 2FA status) and paginate results.
Lists all versions for an existing package owned by the authenticated user, identified by its type and name.
Lists GitHub Packages for an organization, noting specific interpretations for package_type and visibility parameters.
Lists packages for a specified GitHub user, filterable by package type and visibility.
Lists packages of a specific type and visibility within the authenticated user's namespace on GitHub.
Lists all versions of a public package owned by a specific GitHub user, identified by package type, package name, and username.
Lists all pending membership invitations for a specified team within an organization. The authenticated user must be an organization member with the read:org scope. The response includes invitation details such as the invitee's login/email, the role they're being invited to, and who sent the invitation. The 'role' field indicates the type of invitation: - 'direct_member': Regular organization member - 'admin': Organization administrator - 'billing_manager': Billing manager role - 'hiring_manager': Hiring manager role - 'reinstate': Reinstating a previous member Note: If the invitee is not a GitHub member, the 'login' field will be null and only the 'email' field will be populated.
Lists all project cards for a given column_id in GitHub Projects (classic). DEPRECATION NOTICE: GitHub Projects (classic) and its REST API were sunset on April 1, 2025. This action will return 404 for most requests on GitHub.com. However, it may still work on GitHub Enterprise Server instances where classic projects are enabled. For new projects, use GitHub Projects V2 which uses the GraphQL API instead. See: https://github.blog/changelog/2024-05-23-sunset-notice-projects-classic/ Returns a list of project cards including: id, node_id, url, note (or null for linked cards), creator info, content_url (for issue/PR cards), column_url, project_url, timestamps, and archived status.
Lists collaborators for a GitHub Project (classic) by project ID. IMPORTANT: This action uses the Projects (classic) REST API which was sunset on April 1, 2025 for GitHub.com. The API may still be available on GitHub Enterprise Server versions before 3.17. For GitHub.com users: GitHub Projects (classic) has been replaced by the new Projects experience. The new Projects does not have a REST API for listing collaborators - use the GitHub web interface to manage project collaborators instead. You must be an organization owner or a project admin to list collaborators.
Lists all of a GitHub project's columns (e.g., 'To Do', 'In Progress'); project_id must identify a valid, accessible project. Note: This action uses GitHub's Projects (classic) REST API. The Projects (classic) API was sunset on April 1, 2025. This action will return an empty columns list with an informative message for projects that no longer exist or when the API returns 404.
Tool to list all fields in a GitHub Projects V2 project for a specific user. Use when you need to see available fields in a project.
Tool to list items for a user-owned GitHub project. Use when you need to retrieve all items (issues, pull requests, draft issues) from a specific project belonging to a user.
Tool to list items for a user's GitHub Projects (v2) view. Use when you need to retrieve items from a specific view of a user's project. Supports pagination and field filtering.
Lists the public email addresses for the authenticated user.
Lists public GitHub events, which may be delayed by up to 5 minutes, with support for pagination.
Retrieves public events (up to 90 days old, newest first) for a GitHub repository network, including the repository and its forks.
Retrieves a list of public events for a specified GitHub user, in reverse chronological order.
Lists public events for a specified GitHub user (e.g., activities in repositories they watch or are involved in); the target user's profile must be public, and if blocked by the authenticated user, a 404 error is returned.
Lists public gists from GitHub, optionally filtering by a 'since' timestamp and supporting pagination; results are generally newest first.
Lists the verified public SSH keys for a specified GitHub user.
Lists public events for a specified GitHub organization, which must exist. This action retrieves the events that are publicly accessible for the organization specified. It returns a paginated list of events with details about each event.
Lists users who have publicly declared their membership in a specified, existing GitHub organization.
Lists all public repositories on GitHub; use the `since` parameter with a repository ID from a previous result for pagination.
Lists pull requests for a GitHub repository. REQUIRES 'owner' AND 'repo' parameters - both are MANDATORY and must be provided in every call. Does NOT support filtering by assignee or date range - use GITHUB_FIND_PULL_REQUESTS instead for searching PRs by assignee, author, or across multiple repositories.
Lists pull requests for a commit; returns merged PRs that introduced the commit if on the default branch, or open PRs including the commit if on other branches.
Lists all files (including additions, modifications, and removals) associated with a specific pull request in a GitHub repository.
Lists reactions for a specific commit comment; this is a read-only operation.
Lists reactions for a specific, existing issue within an accessible GitHub repository, optionally filtering by content type.
Lists reactions for a specific issue comment in a GitHub repository, optionally filtering by content type.
Lists reactions for a pull request review comment in a repository, optionally filtering by reaction type.
Lists all reactions, or optionally filters reactions by a specific content type, for a given GitHub release.
Lists reactions for an existing team discussion within an organization. This endpoint allows you to retrieve all reactions (emoji responses) made to a specific team discussion. You can optionally filter by reaction type. Note: OAuth app tokens and personal access tokens (classic) need the `read:discussion` scope to use this endpoint.
Lists reactions for a specific comment in a team discussion within an organization, optionally filtering by content type.
Lists assets (e.g., compiled binaries, source code archives) for a specific GitHub release, identified by `release_id` which must be valid for an existing release in the repository.
Retrieves a list of all releases (published, draft, and prerelease) for a specified repository.
Lists repositories in an organization that a fine-grained personal access token has requested access to. Only GitHub Apps can use this endpoint. Requires 'Personal access token requests' organization permissions (read).
Lists Codespaces the authenticated user can access within a specified, existing repository.
Lists the `devcontainer.json` configurations available in a specified repository for use with GitHub Codespaces.
Lists all pending repository invitations for the authenticated user.
Retrieves notifications for the authenticated user from a specified repository, to which the user must have access.
Lists all Codespaces secrets available in a specific repository, without their encrypted values.
Lists repositories a GitHub App installation can access. IMPORTANT: This endpoint requires a GitHub App installation access token (ghs_* prefix) for authentication. OAuth/user access tokens (gho_*) or personal access tokens are not supported and will result in a 403 Forbidden error. Returns 'total_count' and 'repositories' array with pagination support.
Lists public repositories for a specified GitHub user, who must have an existing account.
Lists repositories for the authenticated user; using 'type' with 'visibility' or 'affiliation' API parameters (not in this model) can cause a 422 error.
Lists repositories a valid and existing GitHub user has starred.
Lists repositories the authenticated user has starred, optionally sorted and paginated, including star creation timestamps via 'application/vnd.github.star+json' media type.
Lists repositories a given GitHub user is watching; the username must be a valid and existing GitHub user handle.
Lists repositories the authenticated user is watching (subscribed to for notifications). This action retrieves a list of repositories that the authenticated user is currently watching. It allows the user to manage their watched repositories effectively.
Retrieves a paginated list of GitHub Actions cache usage statistics for repositories within an existing GitHub organization.
Lists activities for a GitHub repository, ensuring the repository exists and is accessible.
Retrieves all autolinks (e.g., for JIRA issues) configured for a repository; requires admin permissions on the repository.
Lists collaborators for a specified repository, provided it exists and is accessible to the authenticated user.
Lists contributors to a specified repository, sorted by number of contributions in descending order; the repository must exist and be accessible.
Lists chronological events (e.g., code pushes, issue activities, PR actions, forks) for a specified, existing GitHub repository.
Retrieves all pending (unaccepted or undeclined) collaboration invitations for a specified GitHub repository.
Lists issues (including pull requests) from a GitHub repository. Requires BOTH 'owner' AND 'repo' parameters (e.g., owner='octocat', repo='Hello-World' for github.com/octocat/Hello-World).
Lists the programming languages used in a GitHub repository, returning a byte count for each language.
Lists names of organization-level secrets shared with the specified repository; actual secret values are not returned and visibility depends on token access.
Lists organization-level variables that are shared with a specific repository. The repository must belong to an organization (not a personal account).
Lists Projects (classic) associated with a specific repository. Note: This action lists GitHub Projects (classic), which is GitHub's legacy project management feature. If the repository has Projects (classic) disabled or uses the newer Projects V2, this will return an empty list. Most modern repositories use Projects V2 (GraphQL API) instead of Projects (classic).
Retrieves all rulesets for a GitHub repository, which define conditions and actions for repository interactions (e.g., branch protections).
Lists rule suite evaluations for a repository, allowing filtering by ref (non-wildcard), time period, actor, and result.
Lists metadata for all secrets in a GitHub repository, excluding their encrypted values.
Lists metadata (e.g., name, creation/update dates) for all Dependabot secrets in a repository; secret values are not included.
Tool to list security advisories for a repository. Use when you need to retrieve security advisories published for a specific repository, optionally filtered by state.
Lists tags for a specified GitHub repository.
Lists all teams with explicit permission to access the specified repository; the repository must exist.
Retrieves all topics for a specified, existing, and accessible repository.
Lists plain text key-value variables for GitHub Actions workflows within a specific, accessible repository.
Retrieves a list of webhooks for a repository, which must exist and be accessible.
Lists all GitHub Actions workflows for a specified repository, which must exist and be accessible.
Gets all users and teams requested to review a specific pull request in a repository.
Lists all review comments on all pull requests within a specified repository.
Lists all review comments on a specific pull request within a GitHub repository.
Lists submitted reviews chronologically for a specific pull request within a GitHub repository.
Lists downloadable GitHub Actions runner application binaries for setting up self-hosted runners in a GitHub organization. Returns download URLs and checksums for various OS/architecture combinations (linux/win/osx on x64/arm/arm64). Requires admin:org scope or fine-grained 'Self-hosted runners' read permission.
Lists available self-hosted runner application binaries for a specific repository, including their OS, architecture, and download URL.
List secret scanning alerts for a GitHub repository using first-party detections. Use this to retrieve detected secrets with filtering by state, type, resolution, and validity. Supports optional hiding of secret literals for security.
Lists all Codespaces secrets accessible to the authenticated user for use within GitHub Codespaces.
Tool to list GitHub Security Advisories using the GraphQL API. Use when you need to query security vulnerabilities and malware advisories from the GitHub Advisory Database with advanced filtering and pagination options.
Query software vulnerabilities documented by GitHub Security Advisories using GraphQL. Use this to find security issues in packages across ecosystems like npm, pip, maven, etc.
Lists repositories that have been granted access to a Codespaces organization secret. Returns all repositories that have been selected when the visibility for repository access to a Codespaces secret is set to 'selected'. Requires admin:org scope and admin access to the organization. Note: This endpoint only returns results when the secret's visibility is set to 'selected'. Secrets with visibility 'all' or 'private' do not have specific repository selections.
Lists repositories that have access to the specified user Codespaces secret. This endpoint retrieves all repositories that the authenticated user has granted access to for a specific user-level Codespaces secret. The secret must already exist for this endpoint to work. Use 'list_secrets_for_the_authenticated_user' to discover available secrets first. Note: The authenticated user must have Codespaces access enabled. OAuth tokens and personal access tokens require the 'codespace' or 'codespace:secrets' scope.
Lists repositories within a specified organization that have been granted access to a particular Dependabot secret. Note: This endpoint only returns results when the secret's visibility is set to 'selected'. Secrets with visibility 'all' or 'private' do not have specific repository selections. Requires 'admin:org' scope and the user must have admin access to the organization.
Lists repositories in an organization that can access a specific organization variable; supports pagination and returns an empty list if no repositories have been granted access. Note: This endpoint only works for variables with visibility set to 'selected' - attempting to use it on variables with 'all' or 'private' visibility will result in a 409 Conflict error.
Lists self-hosted runners for a GitHub organization, optionally filtering by name and paginating results, providing details for each runner such as OS, status, and labels.
Lists all self-hosted runners configured for a repository.
Lists social media accounts publicly linked to an existing GitHub user's profile.
Lists all social media accounts linked to the authenticated user's GitHub profile. This action retrieves the social media accounts associated with the user's GitHub profile, allowing for easy management and visibility of connected accounts. The results include accounts such as Twitter, LinkedIn, and other platforms linked to the GitHub profile.
Tool to list users and organizations who can be sponsored via GitHub Sponsors. Use when you need to discover sponsorable entities with optional filtering by dependency ecosystem.
Lists the public SSH signing keys for a specified GitHub user.
Lists users who have starred the specified GitHub repository, which must exist.
Retrieves a list of gists starred by the authenticated user.
Fetches all required status check contexts for a protected branch; returns an empty list if the branch isn't protected or has no required checks.
Tool to list sub-issues for a specific GitHub issue. Use when you need to retrieve all sub-issues associated with a parent issue, supporting pagination for large hierarchies.
Tool to list GitHub Marketplace subscriptions for the authenticated user. Use when you need to retrieve active marketplace app subscriptions including billing details, plan information, and trial status. Returns subscription information with account, plan, billing cycle, and pricing details.
Lists the authenticated user's stubbed (test/example data, not live) GitHub Marketplace subscriptions, useful for development or testing.
DEPRECATED: Lists tag protection rules for a repository. This API was sunset on August 30, 2024. Use GITHUB_GET_ALL_REPOSITORY_RULESETS instead to view tag protection rules via repository rulesets.
Lists members of a specific team within an organization, including members of child teams.
Lists GitHub projects accessible to a specific team within an organization.
Lists repositories accessible to a specific team within a GitHub organization. Returns a list of repositories that the specified team has access to, including the team's permission level (admin, maintain, push, triage, pull) for each repository. Requires read:org scope and membership in the organization to access team data.
Lists teams for a specified GitHub organization.
Lists all teams across all organizations to which the authenticated user belongs, supporting pagination.
Lists teams assigned to a specific role within a GitHub organization. This endpoint requires organization administrator privileges. Use this to audit which teams have been granted specific organization-level permissions through roles. Note: Organization roles is a feature for enterprise-level GitHub organizations.
Lists GitHub users that a valid GitHub `username` is following, supporting pagination.
Lists people the authenticated user follows.
Lists chronological events (e.g., comments, commits, label changes) for a specific issue in a GitHub repository.
Lists repositories in an organization that a fine-grained personal access token has access to. Requires organization admin permissions or 'Personal access tokens' organization read permission. Only GitHub Apps can use this endpoint.
Retrieves a list of projects for a specified GitHub user, optionally filtering by state and supporting pagination; the username must be a valid GitHub handle. Note: This action uses GitHub's Projects V2 GraphQL API. The legacy Projects V1 REST API has been sunset by GitHub.
Retrieves all GitHub users (individuals and organizations) in chronological order of their sign-up date.
Lists users blocked by a specified GitHub organization.
Lists users blocked by the authenticated user, returning an empty list if no users are blocked.
Lists users assigned to a specific role within a GitHub organization.
Retrieves a list of users watching a specific repository; the repository must be accessible to the authenticated user.
Lists artifacts (e.g., build outputs, test results) for a specific workflow run in a GitHub repository.
Lists workflow runs for a repository, allowing filtering by actor, branch, event, status, creation date, check suite ID, or head SHA; the repository must exist and be accessible.
Lists runs for a specified, existing workflow (identified by ID or filename like `main.yml`) in a GitHub repository, with filtering options.
Locks an existing GitHub issue's conversation, preventing further comments; an optional reason can be specified.
Tool to look up a pending enterprise administrator invitation by invitee, enterprise, and role. Use when you need to check if a specific user has a pending invitation to become an enterprise administrator.
Tool to lookup a GitHub resource by its URL. Use when you need to identify or retrieve information about a GitHub resource from its URL.
Tool to lookup GitHub nodes by their global node IDs. Use when you need to retrieve multiple objects by their IDs in a single batch query.
Tool to lookup a GitHub organization by login using GraphQL. Use when you need organization information via GraphQL API.
Tool to look up a GitHub topic by name using GraphQL. Use when you need to find information about a specific GitHub topic including its popularity (stargazer count) and related topics.
Sets the Codespaces access control policy for a GitHub organization, determining which members can use them. This endpoint requires admin permissions on the organization. The API returns HTTP 204 No Content on success.
Creates or updates values for an organization's predefined custom properties across multiple repositories (up to 30).
Lists repositories within an organization that have been explicitly granted access to a specific GitHub Actions organization secret. Returns all repositories that have been selected when the visibility for repository access to an Actions secret is set to 'selected'. Requires admin:org scope and admin access to the organization. Note: This endpoint only returns results when the secret's visibility is set to 'selected'. Secrets with visibility 'all' or 'private' do not have specific repository selections.
Updates Git author information (name and/or email) for an `author_id` obtained during a repository import, to correctly attribute commits. NOTE: This endpoint has been deprecated by GitHub as of April 12, 2024, and is no longer available. The Source Imports REST API has been retired due to very low usage levels. Please use the GitHub Importer tool at https://github.com/new/import for repository imports.
Marks the GitHub notification thread (identified by `thread_id`) as done or read for the authenticated user, effectively archiving it.
Marks an existing GitHub notification thread, identified by its `thread_id`, as read.
Marks notifications as read or unread, optionally for those updated at or before a `last_read_at` timestamp.
Marks notifications in a repository as read; if 'last_read_at' is specified, notifications updated after this timestamp are not marked as read.
Merges a head branch or commit SHA into a base branch in a repository; fails if there are merge conflicts requiring manual resolution.
Merges an open and mergeable pull request in a repository. A 405 error can occur for multiple reasons: (1) The PR is still in draft mode - convert it to ready-for-review first using GITHUB_UPDATE_A_PULL_REQUEST. (2) Branch protection rules are not satisfied - check for required approving reviews, status checks, or other repository rules that must be met before merging. (3) The base branch has been modified since the PR was last synced - update the PR branch first using GITHUB_UPDATE_A_PULL_REQUEST_BRANCH.
Moves a project card to a specified position within a column (GitHub Classic Projects). DEPRECATION NOTICE: GitHub Projects (classic) and its REST API were sunset on April 1, 2025. This action will return 404 for most requests on GitHub.com. It may still work on GitHub Enterprise Server instances where classic projects remain enabled. For new projects, use GitHub Projects V2 which uses the GraphQL API instead. See: https://github.blog/changelog/2024-05-23-sunset-notice-projects-classic/ On success, the API returns HTTP 201 with an empty body, indicating the card was moved.
Moves a column within a GitHub project (classic) to a new position. DEPRECATION NOTICE: GitHub Classic Projects (V1) and its REST API were sunset on April 1, 2025. This action will return a 404 error on GitHub.com. For new projects, use GitHub Projects V2 which uses the GraphQL API instead. The `position` parameter can be: - 'first': Move the column to the beginning of the project - 'last': Move the column to the end of the project - 'after:<column_id>': Place the column after the specified column (e.g., 'after:67890') See: https://github.blog/changelog/2024-05-23-sunset-notice-projects-classic/
Sends a 'ping' event to a specified, existing organization webhook to test its configuration and ensure it correctly receives events.
Pings an existing webhook on a repository to test its configuration and reachability by GitHub.
Privately reports a security vulnerability to a repository's maintainers. IMPORTANT: You cannot report vulnerabilities to repositories you own - this API is for third-party security researchers to report to other repositories. The target repository must have private vulnerability reporting enabled. Specify EITHER `severity` OR `cvss_vector_string`, but not both.
Tool to publish a draft GitHub Sponsors tier using GraphQL. Use when you need to make a draft sponsors tier visible to potential sponsors. The tier must already exist in draft status.
Redelivers a specific webhook delivery for a webhook within an organization, to resend an event that previously failed or was not processed.
Redelivers a specific, previously made webhook delivery (`delivery_id`) for a repository's webhook (`hook_id`).
Deletes a custom property, specified by `custom_property_name`, from an existing organization (`org`) for which the property is currently defined, preventing its future assignment to repositories.
Removes a label currently applied to a specific issue in a repository.
Removes all labels from a specified issue in a GitHub repository; this operation is idempotent.
Revokes all organization roles for a team in an organization; this is destructive and succeeds even if the team initially has no roles.
Revokes all assigned organization-level roles from a specified user (who must be a member of the organization) within a GitHub organization, without removing the user from the organization or affecting repository-specific roles.
Removes a member from a GitHub organization. This action permanently removes a user's membership from the specified organization, revoking their access to all organization resources, repositories, and teams. Requirements: - The authenticated user must be an organization owner - The target user must currently be a member of the organization Note: This action cannot be used to remove the last owner of an organization.
Revokes an organization role that a team currently possesses within an organization.
Removes a custom organization role from a user within a GitHub organization, provided the organization exists, the user is a member, and the role_id corresponds to a valid custom role in that organization.
Removes all GitHub App access restrictions from a protected branch in a repository; the branch must have protection rules configured, and this action does not alter user or team restrictions.
Removes a project from a team within an organization; this action requires the project to be currently associated with the team.
Removes a collaborator from a specified GitHub repository, provided the repository exists and the user is an existing collaborator.
Removes a repository from a GitHub App installation for the authenticated user, given a valid `installation_id` and the `repository_id` of a repository currently linked to that installation; this operation is idempotent.
Disassociates a repository from a team; team members may lose access permissions, but the repository and team are not deleted.
Removes a selected repository's access to a user's Codespaces secret; the secret must exist and the repository must have previously been granted access.
Removes specified assignees from a GitHub issue; requires push access, and invalid removal attempts are silently ignored.
Removes a custom label from a repository's self-hosted runner; this operation is idempotent.
Removes a currently assigned custom label (`name`) from a self-hosted runner (`runner_id`) in an organization (`org`). This action allows the organization to manage the labels associated with their runners effectively.
Removes all custom labels from a self-hosted runner registered at the repository level, leaving only its default labels and any labels inherited from its runner group or organization.
Removes all interaction restrictions from public repositories in the specified GitHub organization, allowing all users to resume interactions.
Removes all interaction restrictions for a repository, enabling all users to comment, open issues, and create pull requests by lifting any existing temporary interaction limits.
Deletes a GitHub Codespaces secret from an organization by its name; this operation is idempotent.
Permanently removes a specific Dependabot secret, by its `secret_name`, from the GitHub `org`, making it unavailable to Dependabot for that organization.
Removes a user, who must be an outside collaborator, from the specified GitHub organization, revoking their access to all its repositories.
Removes the authenticated user's public organization membership, making it private. The user remains a member of the organization but their membership is no longer publicly visible. This operation is idempotent - calling it when the membership is already private will succeed.
Removes all interaction restrictions (limitations on comments, issues, or pull requests) from all public repositories owned by the authenticated user.
Removes a repository's access to an organization-level Codespaces secret, if it was previously granted.
Revokes a specific repository's access to an organization-level Dependabot secret, applicable only when the secret has 'selected' visibility and the specified repository currently has access.
Removes currently assigned user logins and/or team slugs from a GitHub pull request's list of requested reviewers.
Removes a specific repository's access to an organization-level secret; the repository must have been previously granted access to this secret.
Removes a repository's access to an organization variable that has 'selected' visibility. This endpoint removes a specific repository from an organization variable's access list. The variable must have its visibility set to 'selected' for this operation to work. Returns a 409 Conflict error if the variable visibility is not 'selected'.
Removes specified status check contexts from a protected branch's required status checks. This action removes the specified status check contexts from the existing list of required status checks for a protected branch. The branch must already have branch protection enabled with status checks configured. Note: The 'contexts' parameter is deprecated by GitHub in favor of 'checks' array. For new implementations, consider using update_status_check_protection with the 'checks' parameter instead.
Removes status check protection from a branch, disabling required status checks for merging pull requests; will only have an effect if status check protection is currently configured on the branch.
Removes specified teams from push access to a protected branch. This action removes teams from the list of teams with push access to a protected branch. Removing a team will also remove push access for any child teams. Prerequisites: - The repository must be owned by an organization (not a personal account) - The branch must have protection rules enabled - The branch protection must have restrictions configured - The teams must currently have push access to the branch
Removes a user from a specific team within an organization. This action requires admin:org scope permissions. It will fail if: - Team synchronization with an Identity Provider (IdP) is enabled (403 Forbidden) - The organization, team, or user membership doesn't exist (404 Not Found) - You don't have sufficient permissions to manage team memberships (403 Forbidden) Note: If the removed user was the last member and the team is not nested, the team may be deleted automatically.
Removes specified users from the list of people allowed to push to a protected branch. Important notes: - This action only works on organization-owned repositories (not personal repos) - The branch must have protection rules with push restrictions enabled - Users being removed must currently have push access to the branch - The combined total of users, apps, and teams is limited to 100 items
Removes a user as a collaborator from an organization project (classic). IMPORTANT: This action uses the Projects (classic) REST API which is being deprecated. The Projects (classic) feature was sunset on GitHub.com. This API may still work on GitHub Enterprise Server versions before 3.17. Requirements: - You must be an organization owner or a project admin to remove a collaborator - The user must already be a collaborator on the specified project - The project must be an organization project (classic), not a Projects V2 project For GitHub.com users: Consider using GitHub Projects V2 instead, which can be managed through the GraphQL API.
Removes selected users from GitHub Codespaces billing access for an existing organization.
Renames an existing branch in a GitHub repository; the new name must be unique and adhere to GitHub's naming conventions, and the current branch name cannot contain wildcard characters.
Renders Markdown to HTML; for 'gfm' mode, provide 'context' (owner/repo) to correctly link issues, pull requests, and user mentions.
Tool to render raw Markdown text to HTML using GitHub's markdown API. Use when you need to convert plain Markdown content to HTML without GitHub-specific features like issue references or @mentions.
Replaces all topics of a repository.
Replaces the list of repositories that can access a Dependabot organization secret when the secret's visibility is already set to 'selected'.
Replaces the list of repositories that can access an organization-level Codespaces secret. This operation completely replaces the existing list of repositories with the provided list. The secret must already have its visibility set to 'selected' for this operation to succeed. Use this when you want to set an exact list of repositories that should have access. Prerequisites: - The organization must exist and you must have admin:org scope - The Codespaces secret must already exist in the organization - The secret's visibility must be set to 'selected' (not 'all' or 'private') Returns HTTP 204 No Content on success, 404 if secret/org not found, 409 if visibility is not 'selected'.
Manually triggers a GitHub Pages build for a repository if GitHub Pages is enabled, useful for deployments not automatically built or for retrying failed builds.
Adds reviewers to a specific pull request identified by owner, repo, and pull_number. This is NOT a search action - it operates on an already-known PR number. Requires `owner`, `repo`, `pull_number`, and at least one of `reviewers` or `team_reviewers`.
Triggers a re-run of a specific check run in a GitHub repository, resetting its status to 'queued', clearing its conclusion, and triggering the `check_run` webhook with `rerequested` action. IMPORTANT: This endpoint requires GitHub App authentication with 'checks:write' permission. The check run can ONLY be re-requested by the same GitHub App that originally created it. OAuth tokens and personal access tokens (PAT) cannot use this endpoint.
Triggers a new run of an existing check suite within a repository, resetting its status to 'queued', clearing its conclusion, and triggering the `check_suite` webhook with `rerequested` action. IMPORTANT: This endpoint requires GitHub App authentication with 'checks:write' permission. OAuth tokens and classic personal access tokens (PAT) cannot use this endpoint. Only GitHub App user access tokens, GitHub App installation access tokens, or fine-grained personal access tokens with checks:write permission are supported.
Re-runs a specific job and any dependent jobs from a GitHub Actions workflow run in the specified repository, optionally enabling debug logging.
Re-runs a specific GitHub Actions workflow run identified by its owner, repository, and run ID, optionally enabling debug logging.
Re-runs all failed jobs and their dependent jobs from a specified workflow run if the run contains previously failed jobs.
Invalidates the provided OAuth `access_token` and generates a new one for the GitHub OAuth App identified by `client_id`. Used for token rotation when a token may be compromised or for regular security maintenance. Note: This endpoint requires the OAuth App owner's credentials (client_id/client_secret for Basic Auth).
Restores a package in an organization, provided it was deleted within the last 30 days.
Restores a user-owned package previously deleted from GitHub Packages, if restorable under GitHub's data retention policy (typically within 30 days of deletion).
Restores a package deleted by the authenticated user within the last 30 days, if its namespace and version are still available.
Restores a package version that was deleted by the authenticated user within the last 30 days.
Restores a package version for an organization, provided it was deleted within the last 30 days.
Restores a specific, user-owned package version if it was deleted within the last 30 days and its original namespace and version name are still available.
Tool to retire a published payment tier from your GitHub Sponsors profile using GraphQL. Use when you need to prevent a tier from being used for new sponsorships. Existing sponsors at this tier remain unaffected.
Approves or denies a pending fine-grained personal access token request for organization resources; must be performed by a GitHub App.
Approves or rejects pending custom deployment protection rules for a workflow run. This endpoint allows GitHub Apps to review their own pending custom deployment protection rules for a specific workflow run. The review can either approve (allowing the deployment to proceed) or reject (blocking the deployment). **Important notes:** - GitHub Apps can only review their own custom deployment protection rules - This endpoint requires GitHub App installation access tokens with Deployments permission (write) - Custom deployment protection rules are available in public repos for all plans; for private/internal repos, GitHub Enterprise is required - Returns 204 No Content on success
Approves or rejects pending deployments for a specific workflow run that are in a 'waiting' state within specified, configured environments.
Approves or denies multiple fine-grained personal access token requests for an organization in bulk. This endpoint processes multiple PAT request approvals or denials in a single API call. All specified pat_request_ids must refer to currently pending requests. Important: This endpoint can ONLY be called by GitHub Apps with the 'organization_personal_access_token_requests:write' permission. It cannot be called with personal access tokens or OAuth apps. On success, returns HTTP 202 Accepted with an empty body.
Revokes the GitHub App's current installation access token, immediately invalidating it for API authentication. IMPORTANT: This endpoint requires a GitHub App installation access token (ghs_* prefix) for authentication. OAuth tokens (gho_*) or personal access tokens are not supported and will result in a 403 Forbidden error. After successful revocation, the token becomes permanently invalid and cannot be used for any subsequent API calls. To continue API operations, a new installation access token must be generated.
Tool to run an arbitrary GitHub GraphQL v4 query or mutation. Use when fetching multiple datasets in one batch. Cost-based rate limit: ~5,000 points/hour; keep field selections narrow, avoid deep nesting, and include rateLimit in responses to monitor quota. Responses are nested under data.data (e.g., data.data.repository.vulnerabilityAlerts); always inspect the errors array even on HTTP 200, as partial failures embed there. Paginate by looping on pageInfo.hasNextPage and advancing with pageInfo.endCursor. Search results cap at ~1,000 items per query; split by label, date range, or repository for full coverage. Use ProjectV2 nodes, not Classic Projects (deprecated). Parallel mutations (e.g., addProjectV2ItemById) can trigger transient conflicts; use sequential execution.
Tool to run a GitHub GraphQL relay query. The relay field is a workaround for re-exposing the root query object. Use when you need to access root query fields through the relay context.
Searches code file contents and paths on the default branch of GitHub repositories using a query string; searches only files under 384KB, returns max 1000 results by best match, and is optimized for precision.
Tool to search code across multiple pages using GitHub's code search API. Use when single-page searches may miss matches and you need a full or capped result set. GitHub caps results at ~1,000 total items regardless of pagination; results for broad queries may be silently truncated. Only the default branch is indexed, and very large files may be excluded — treat results as potentially partial. Rate limit: ~30 requests/minute; honor `Retry-After` on 403/429 responses.
Finds commits on GitHub using a query string (q) supporting keywords and qualifiers, with options for sorting and pagination.
Searches commits across GitHub using the Search API (e.g., by author/email/org/date range) without per-repo scanning. Use when you need to find commits by author, committer email, organization, or date ranges across multiple repositories. This avoids the need to list commits per repository and prevents 409 errors on empty repos.
Tool to perform GitHub GraphQL searches across issues, pull requests, repositories, users, and discussions. Returns up to 1,000 results with cursor-based pagination. Use when you need structured search results with specific fields.
Searches GitHub for issues and pull requests. Supports keywords, qualifiers (repo:, org:, user:, state:, label:, author:, assignee:, mentions:, etc.), and type filters (is:issue, is:pr). Type filters cannot be used alone - they must be combined with at least one keyword or other qualifier. All other qualifiers work independently. The @me shorthand (e.g., assignee:@me, mentions:@me) is automatically resolved to your username. Logical operators (AND, OR, NOT) are supported but limited to a maximum of 5 operators total per query.
Searches for labels within a GitHub repository by keywords in their names or descriptions.
Searches GitHub repositories using a flexible query (keywords, qualifiers) with sorting, ordering, and pagination. IMPORTANT: The 'q' parameter (search query) is REQUIRED and must always be provided.
Finds topics on GitHub using keywords and qualifiers with GitHub's search syntax, supporting pagination.
Searches for users on GitHub by criteria like username, email, location, followers, or repository associations, using a flexible query string `q`.
Enables administrator enforcement on a branch, making existing protection rules also apply to administrators; branch protection rules must already be configured.
Replaces the list of GitHub Apps permitted to push to a protected branch. This action completely replaces the existing list of apps with push access - it does not add to or merge with the current list. Requirements: - The branch must already have protection rules enabled with push restrictions configured - Apps must be installed on the repository and have 'contents' write permission - Push restrictions are only available for organization-owned repositories with GitHub Team or Enterprise Cloud plans
Sets the authenticated user's notification subscription for a repository.
Sets whether a GitHub notification thread is ignored (muted) or unignored (unmuted), for a `thread_id` that must identify an existing notification thread.
Updates an organization's default GITHUB_TOKEN permissions for workflows and whether GitHub Actions can approve pull requests; note that allowing Actions to approve pull requests (`can_approve_pull_request_reviews: true`) is a security risk.
Sets the default permissions for the GITHUB_TOKEN within a repository and configures whether GitHub Actions can approve pull requests.
Sets the visibility ('public' or 'private') of the authenticated user's primary email address on GitHub, if one is configured.
Sets the GitHub Actions permissions policy for an organization, specifying which repositories can run Actions and which actions/workflows are allowed; if 'selected' is chosen for either, manage the specific lists via other endpoints.
Sets GitHub Actions permissions for a repository, enabling/disabling Actions and defining the policy for allowed actions and reusable workflows.
Limits interactions (comments, new issues, PRs) in an organization's public repositories by user type and duration, typically to mitigate high traffic or unwanted activity.
Temporarily limits which GitHub users (e.g., existing_users, contributors_only) can interact (comment, open issues, create pull requests) in a repository for a specified duration.
Sets or updates temporary interaction restrictions for all public repositories owned by the authenticated user, overriding any repository-specific limits.
Replaces all existing labels on a GitHub issue with a new set of labels.
Sets the OpenID Connect (OIDC) subject claim template for a GitHub repository, allowing use of the default template or a custom one defined by `include_claim_keys` if `use_default` is `false`.
Sets the GitHub Actions permissions for an existing organization, specifying allowed GitHub-owned actions, verified creator actions, and action/workflow patterns from public repositories.
Sets the custom labels for a self-hosted runner in an organization; this operation does not affect default system-assigned labels (e.g., 'self-hosted', 'linux', 'x64').
Sets allowed GitHub Actions and reusable workflows for a repository, managing permissions for GitHub-owned, verified creator, or specific pattern-matched actions/workflows (note: `patterns_allowed` applies only to public repositories).
Replaces all custom labels for a specific self-hosted runner in a repository; an empty list for `labels` removes all existing custom labels.
Replaces the list of repositories that can access an organization-level variable; the variable's visibility must be 'selected'.
Replaces the list of repositories that can access an organization secret; only effective if the secret's visibility is 'selected'. Prerequisites: - The organization secret must already exist - The secret's visibility must be set to 'selected' (not 'all' or 'private') - Requires admin:org scope or actions secrets fine-grained permission This action completely replaces the repository access list. To add or remove individual repositories without affecting others, use the dedicated add/remove repository actions instead.
Defines the list of repositories permitted to access a specific Codespaces secret for the authenticated user.
Replaces required status check contexts for a protected branch, requiring admin permissions; an empty `contexts` array removes all checks.
Replaces the list of teams with push access to a protected branch. This action sets (replaces) the teams that have push access to a protected branch. Unlike 'Add team access restrictions' (POST), this action replaces the entire list rather than adding to it. Use an empty list to remove all team restrictions. Prerequisites: - The repository must be owned by an organization (not a personal account) - The branch must have protection rules enabled - The branch protection must have restrictions configured - The teams must exist in the organization and have repository access
Replaces the list of users with push access to a protected branch in an organization repository. Important notes: - This action only works on organization-owned repositories (not personal repos) - The branch must already have protection rules with restrictions enabled - This REPLACES (not adds to) the existing list of users with push access - Users must have write access to the repository to be added - The combined total of users, apps, and teams is limited to 100 items - To add users without replacing, use the 'add_user_access_restrictions' action instead
Tool to set interaction limits on a user's public repositories using GraphQL. Use when you need to temporarily restrict who can comment, open issues, or create pull requests. Limits apply to the authenticated user or a specified user.
Sets the access level for workflows outside a repository to use actions and reusable workflows within that repository.
Stars a GitHub gist identified by `gist_id`; this action is idempotent and returns a 204 No Content status upon success, even if the gist is already starred.
Stars a specified repository (identified by owner and repo name) for the authenticated user; this action is idempotent and succeeds even if the repository is already starred. Requires explicit repository identification via owner and repo parameters.
Initiates the startup process for an existing GitHub Codespace (identified by `codespace_name`) if it's in a startable state like 'Available' or 'Stopped'.
Stops a running codespace for an organization member. This action allows organization administrators to stop a codespace that belongs to a member of their organization. The codespace must be in a running state (e.g., 'Available') to be stopped. Required permissions: - OAuth/PAT: admin:org scope - Fine-grained tokens: 'Organization codespaces' (write) or 'Codespaces lifecycle admin' (write) Common HTTP responses: - 200: Codespace successfully stopped, returns codespace object - 304: Not modified (codespace already stopped) - 401: Authentication required - 403: Insufficient permissions (need admin:org) - 404: Organization, user, or codespace not found
Stops a running or available Codespace for the authenticated user, pausing its execution and billing.
Finalizes a pending pull request review (identified by `review_id`) with a required `event` (APPROVE, REQUEST_CHANGES, COMMENT) and an optional `body`.
Synchronizes a branch in a forked GitHub repository with its upstream counterpart, assuming the repository is a fork, the branch exists, an upstream is configured, and the merge is conflict-free.
Triggers a simulated push event to test a repository's push webhook; a test event is only delivered if the webhook is subscribed to 'push' events, otherwise, it returns 204 No Content without sending a POST.
Initiates a repository transfer to a new owner (who must accept the request); if the new owner is an organization, it must be configured to allow transfers.
Unblocks a GitHub user, provided they are currently blocked by the authenticated user.
Unblocks a user from an organization, allowing renewed interaction with its resources, provided the user is currently blocked (otherwise, a 404 error may occur).
Unfollows an existing GitHub user; this action is idempotent, succeeding even if the authenticated user is not currently following them.
Tool to unfollow a GitHub organization using GraphQL. Use when you need to stop following a specific organization on GitHub.
Tool to unfollow a GitHub user using GraphQL. Use when you need to stop following a specific user on GitHub.
Unlocks a currently locked GitHub issue in the specified repository, allowing new comments and interactions.
Unlocks a repository that was locked for migration within a GitHub organization. This action is part of the organization migrations workflow. When you start a migration with `lock_repositories=true`, the source repositories are locked to prevent changes during export. After the migration is complete and applied to the target instance, use this action to unlock the repositories so they can be accessed or deleted. Requirements: - You must be an organization owner to unlock repositories - The repository must be currently locked as part of the specified migration - This endpoint does not work with GitHub App tokens or fine-grained personal access tokens Typical workflow: 1. Start an organization migration with POST /orgs/{org}/migrations 2. Wait for the migration to complete (state: "exported") 3. Apply the migration to your target instance 4. Unlock each migrated repository using this action 5. Delete the source repositories if no longer needed
Unlocks a repository (`repo_name`) that was locked as part of a user migration (`migration_id`), making it usable or deletable; this action requires the repository to be currently locked.
Removes a star from the specified gist; the action is idempotent and will not error if the gist was not previously starred by the user.
Removes the authenticated user's star from a specified repository, which must already be starred by the user.
Updates an existing check run for a specific commit in a repository, allowing modifications to its status, conclusion, output, and other details. NOTE: This endpoint requires GitHub App authentication with 'checks:write' permission - OAuth tokens and personal access tokens cannot update check runs.
Updates a specific code scanning alert in a GitHub repository, primarily to change its state (e.g., 'open' or 'dismissed').
Changes the body of an existing commit comment.
Updates an existing custom role in an organization by modifying its name, description, or permissions; at least one of these fields must be provided.
Updates the name pattern of an existing deployment branch policy for a specific environment in a repository.
Updates the title and/or body of a specific team discussion within an organization.
Updates the body of a comment in a team's discussion within an organization.
Updates a gist's description, and/or its files (including content, filename changes, or deletion).
Updates an existing comment on a specified gist.
Updates an existing label's name, color, or description within a specified repository.
Updates a milestone in a repository, identified by `owner`, `repo`, and `milestone_number`, by allowing modification of its `title`, `state`, `description`, or `due_on`; at least one of these four attributes must be provided to perform an update.
Updates an existing environment variable's name and/or value in a specific GitHub repository environment; requires providing either a new name or a new value.
Updates an existing GitHub issue's title, body, state, milestone, labels, or assignees; `state_reason` is only processed if `state` also changes, and use `null` or `[]` to clear applicable fields.
Updates an existing comment on an issue or pull request within a specified repository. You can only update comments that the authenticated user has permission to edit. The comment_id can be obtained from the list_issue_comments or get_an_issue_comment actions.
Updates an organization's settings; changing security-related fields requires admin, owner, or security manager permissions.
Updates an existing GitHub Actions organization variable's name, value, or visibility (`all`, `private`, `selected`), requiring `selected_repository_ids` with valid repository IDs if visibility is `selected`.
Updates the configuration (URL, content type, secret, SSL verification), subscribed events, active status, or name of an existing webhook for a specified organization.
Updates an existing GitHub project (V2) attributes like title, description, visibility, and state. Note: This action uses GitHub's Projects V2 GraphQL API. The legacy Projects (classic) REST API was sunset on April 1, 2025. The project is identified by its number (visible in the project URL) and owner (either a username or organization name). If no owner is specified, the authenticated user is assumed. At least one field to update must be provided.
Updates an existing pull request, allowing changes to attributes like title, body, state, base branch, and maintainer modification settings.
Updates an open pull request's head branch by merging the latest changes from its base branch, if mergeable and repository merging is enabled; operates asynchronously.
Updates an existing Git reference (e.g., a branch or tag) to point to a specific commit SHA. By default, only allows fast-forward updates (where the new commit is a descendant of the current one). Set `force=true` to allow non-fast-forward updates that rewrite history. IMPORTANT: The reference must already exist - use 'Create a reference' action to create new refs.
Updates an existing release in a GitHub repository, allowing modification of its attributes; if linking a discussion, the `discussion_category_name` must refer to an existing category in the repository.
Updates the name, label, or state of a release asset in a GitHub repository, requiring at least one of these properties to be provided for modification.
Updates settings for an existing GitHub repository, such as name, description, visibility, merge strategies, and security configurations.
Updates an active repository invitation to modify the invited user's permissions; the specified repository and invitation must exist.
Updates an existing repository ruleset, identified by `ruleset_id` for a given repository, allowing partial updates to its configuration such as name, target, enforcement, bypass actors, conditions, and rules.
Updates the name and/or value of an existing GitHub Actions variable in a repository.
Updates the URL, content type, secret, SSL verification, events, or active status for an existing repository webhook, specified by `owner`, `repo`, and `hook_id`.
Updates a team's settings (e.g., name, description, privacy, parent team) within a GitHub organization, identified by its slug and organization name.
Updates the protection settings for an existing branch in a repository, which must not contain wildcard characters.
Updates the default setup configuration for code scanning in a repository; GitHub Advanced Security must be enabled for the repository.
Updates an existing GitHub Codespace's machine type, display name, or recent folders for the authenticated user; machine type changes take effect on the next start.
Sets the Git Large File Storage (LFS) preference for a repository during a source import. NOTE: This endpoint has been deprecated by GitHub as of April 12, 2024, and is no longer available. The Source Imports REST API has been retired due to very low usage levels. Please use the GitHub Importer tool at https://github.com/new/import for repository imports.
Update an existing issue type for a GitHub organization. Requires the authenticated user to be an organization administrator. OAuth tokens need admin:org scope.
Updates the configuration (URL, content type, secret, SSL verification) for an existing webhook within a specified organization.
Updates an existing project card's note and/or archived status (GitHub Classic Projects). DEPRECATION NOTICE: GitHub Projects (classic) and its REST API were sunset on April 1, 2025. This action will return 404 for most requests on GitHub.com. However, it may still work on GitHub Enterprise Server instances where classic projects are enabled. For new projects, use GitHub Projects V2 which uses the GraphQL API instead. See: https://github.blog/changelog/2024-05-23-sunset-notice-projects-classic/
Updates the name of an existing column, identified by `column_id`, in a GitHub project (classic). DEPRECATION NOTICE: GitHub Classic Projects (V1) and its REST API were sunset on April 1, 2025. This action will return a 404 error on GitHub.com. For new projects, use GitHub Projects V2 which uses the GraphQL API instead. See: https://github.blog/changelog/2024-05-23-sunset-notice-projects-classic/
Updates the body text of an existing pull request review.
Updates the body of an existing review comment on a pull request.
Updates pull request review protection settings (e.g., required approvals, review dismissal, bypass allowances) for a branch; branch protection features must be available for the repository.
Updates repository preferences for automatic Check Suite creation on code pushes, allowing configuration for specific GitHub Apps that must be installed on the repository with `checks:write` permission.
Updates the configuration (e.g., payload URL, content type, secret, SSL verification) for an existing webhook in a specified repository.
Revokes organization access for the personal access tokens identified by `pat_ids`; this action must be performed by a GitHub App, and `pat_ids` must be valid and associated with the organization. AUTHENTICATION REQUIREMENT: This endpoint requires GitHub App authentication with 'Personal access tokens' organization permissions (write). Standard personal access tokens CANNOT use this endpoint. The GitHub App must also have access to the organization.
Updates required status checks for a branch, optionally requiring it to be up-to-date before merging.
Tool to update notification subscription state for issues, pull requests, or discussions. Use when you need to subscribe, unsubscribe, or ignore notifications for a specific GitHub item.
Updates the authenticated user's GitHub profile; a new public email must be verified, and existing private emails remain private even if specified.
Revokes a fine-grained personal access token's access to an organization. IMPORTANT: This endpoint can ONLY be called by GitHub Apps with 'Personal access tokens' organization permissions (write). Personal access tokens (PATs) cannot use this endpoint. Use GITHUB_LIST_ORG_RESOURCE_ACCESS_TOKENS to get valid pat_id values for tokens that have access to your organization.
Tool to update an existing GitHub user list. Use when you need to modify the name, description, or privacy settings of a user list.
Tool to update which of the viewer's lists an item belongs to on GitHub. Use when you need to add an item (repository, issue, pull request, etc.) to specific user lists or move it between lists.
Tool to update a field value for an item in a user's GitHub ProjectV2. Use when you need to modify a field value of an existing project item.
Tool to update your status on GitHub. Use when you need to set or clear your GitHub profile status with an emoji, message, and availability indicator.
Tool to upload a binary asset to an existing GitHub release. Use when you need to attach files like installers or backups to a release programmatically.
Uploads a gzipped and Base64 encoded SARIF file to a GitHub repository for a specific commit and reference; use `checkout_uri` if SARIF paths are absolute.
Creates or updates up to 30 custom property values for a repository; custom properties must be predefined at the organization or repository level, and setting a property's value to `null` removes it.
Verifies if the authenticated user has accepted permissions for a specific devcontainer configuration in a repository, typically to ensure awareness before a codespace is created or used.
Anything GitHub exposes through its API. Common developer tools workflows on Definable include triage issues, review pull requests, monitor builds. Personas can call any of the 867 GitHub tools directly, or react to its 46 triggers, then chain the result into another integration without you writing code.
GitHub uses OAUTH2 on Definable. You connect once from the integrations page, scoped to the permissions you choose, and from then on any persona that has the integration enabled can act on your behalf. Tokens are encrypted at rest and rotated automatically.
Yes — every Definable plan, including Starter, includes access to all 867 GitHub tools. You only need a separate GitHub subscription if GitHub itself charges per seat or per API call.
Every call from a persona to GitHub is logged with the user, persona, prompt, and response. Tokens never leave Definable's secrets vault, scopes are configurable per persona, and you can revoke access at any time from the integration page.
Sign up for Definable, open the integrations page, find GitHub, and connect via OAuth or API key. You can immediately attach GitHub to any persona and start running workflows. The free Starter plan includes 5,000 credits/month.
Definable exposes all 867 GitHub actions as callable tools — including `Abort Repository Migration`, `Accept a repository invitation`, `Add app access restrictions`, plus 864 more. Each tool gets a typed parameter schema so personas know exactly how to call it.
Wire it up in minutes. No coding required.