Dependency Scanning with SBOM support for Java Gradle build files
- Available in: Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related issue
GitLab dependency scanning by using SBOM now supports scanning Java build.gradle and build.gradle.kts build files.
Previously, dependency scanning for Java projects using Gradle required a lock file to be present.
Now, when a lock file is not available, the analyzer automatically falls back to scanning build.gradle and build.gradle.kts files, extracting and reporting only direct dependencies for vulnerability analysis.
This improvement makes it easier for Java projects using Gradle to enable dependency scanning without requiring a lock file.
To enable manifest fallback, set the DS_ENABLE_MANIFEST_FALLBACK CI/CD variable to "true".
Dependency scanning SBOM-based scanning extended to self-managed
In GitLab 18.10, we’re extending limited availability status to self-managed instances for the new SBOM-based dependency scanning feature.
This feature was initially released in GitLab 18.5 with limited availability for GitLab.com only, behind the feature flag dependency_scanning_sbom_scan_api and disabled by default.
With additional improvements and fixes, we now have confidence to reliably use the new SBOM scanning internal API and enable this feature flag by default.
This internal API allows the dependency scanning analyzer to generate a dependency scanning report containing all component vulnerabilities.
Unlike the previous behavior (Beta) that processed SBOM reports after CI/CD pipeline completion, this improved process generates scan results immediately during the CI/CD job, giving users instant access to vulnerability data for custom workflows.
Self-managed customers who encounter issues can disable the dependency_scanning_sbom_scan_api feature flag. The analyzer will then fall back to the previous behavior.
To use this feature, import the v2 dependency scanning template Jobs/Dependency-Scanning.v2.gitlab-ci.yml.
We welcome feedback on this feature. If you have questions, comments, or would like to engage with our team, please reach out in this feedback issue.
License scanning support for Dart/Flutter projects using Pub package manager
- Available in: Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related epic
GitLab now supports license scanning for Dart and Flutter projects that use the pub package manager.
Previously, teams building with Dart or Flutter were unable to identify the licenses of their open source dependencies directly within GitLab, creating compliance blind spots for organizations with license policy requirements.
License data is sourced directly from pub.dev, the official Dart package repository, and results are surfaced alongside other supported ecosystems.
Dart/Flutter dependency scanning and vulnerability detection were already supported.
Conan 2.0 package registry support (Beta)
- Available in: Free, Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related issue
C and C++ development teams using Conan as their package manager have long requested registry support in GitLab. Previously, the Conan package registry was experimental and only supported Conan 1.x clients, limiting adoption for teams that have migrated to the modern Conan 2.0 toolchain.
The Conan package registry now supports Conan 2.0 and has been promoted from Experimental to Beta. This release includes full v2 API compatibility, recipe revision support, improved search capabilities, and proper handling of upload policies including the --force flag. Teams can publish and install Conan 2.0 packages directly from GitLab using standard Conan client workflows, reducing the need for external artifact management solutions like JFrog Artifactory.
With this update, platform engineering teams managing C and C++ dependencies can consolidate their package management within GitLab alongside their source code, CI/CD pipelines, and security scanning. The Conan registry supports both project-level and instance-level endpoints, and works with personal access tokens, deploy tokens, and CI/CD job tokens for authentication.
We welcome feedback as we work toward general availability. Please share your experience in the epic.
Manage container virtual registries with a dedicated UI (Beta)
- Available in: Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related epic
When the container virtual registry launched in beta last milestone, platform engineers could aggregate multiple upstream container registries — Docker Hub, Harbor, Quay, and others — behind a single pull endpoint. However, all configuration required direct API calls, meaning teams had to maintain scripts or manual curl commands to create and manage their registries, configure upstreams, and handle changes over time. This added operational overhead and made the feature inaccessible to users who weren’t comfortable working directly with the API.
Container virtual registries can now be created and managed directly from the GitLab UI. From the group-level container registry page, you can create new virtual registries, configure upstream sources with authentication credentials, edit existing configurations, and delete registries you no longer need — all without leaving GitLab or writing a single API call. The UI integrates seamlessly with the existing container registry experience, making virtual registries a first-class part of your group’s artifact management workflow.
This feature is in beta. To share feedback, please comment in the feedback issue.
GitLab Helm Chart registry generally available
- Available in: Free, Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related issue
Teams using Helm to manage Kubernetes application deployments can now rely on the GitLab Helm Chart registry for production workloads. Previously in beta, the registry is now generally available following the resolution of key architectural and reliability concerns.
The path to GA included resolving a hard limit that prevented the index.yaml endpoint from returning more than 1,000 charts, fixing a background indexing bug that caused newly published chart versions to be missing from the index, completing a full AppSec security review, and adding Geo replication support for Helm metadata cache, ensuring high availability for self-managed customers running GitLab Geo.
Platform and DevOps teams can publish and install Helm charts directly from GitLab using standard Helm client workflows, with support for project-level endpoints and authentication using personal access tokens, deploy tokens, and CI/CD job tokens. Now you can keep charts alongside the source code, pipelines, and security scanning that depend on them.
Task item support in Markdown tables
- Available in: Free, Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related issue
You can now use task item checkbox syntax directly in Markdown table cells.
Previously, achieving this required a combination of raw HTML and Markdown, which was
cumbersome and difficult to maintain.
This improvement makes it easier to track task completion directly within structured table
layouts in issues, epics, and other content.
Pipeline secret detection in security configuration profiles
- Available in: Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation
In GitLab 18.9, we introduced security configuration profiles with the Secret Detection - Default profile, starting with push protection. You use the profile to apply standardized secret scanning across hundreds of projects without touching a single CI/CD configuration file.
The Secret Detection - Default profile now also covers pipeline-based scanning, providing a unified control surface for secret detection across your entire development workflow.
The profile activates three scan triggers:
- Push Protection: Scans all Git push events and blocks pushes where secrets are detected, preventing secrets from ever entering your codebase.
- Merge Request Pipelines: Automatically runs a scan each time new commits are pushed to a branch with an open merge request. Results only include new vulnerabilities introduced by the merge request.
- Branch Pipelines (default only): Runs automatically when changes are merged or pushed to the default branch, providing a complete view of your default branch’s secret detection posture.
Applying the profile requires no YAML configuration. The profile can be applied to a group to propagate coverage across all projects in the group, or to individual projects for more granular control.
macOS Tahoe 26 and Xcode 26 job image
You can now create, test, and deploy applications for the newest
generations of Apple devices using macOS Tahoe 26 and Xcode 26.
With hosted runners on macOS,
your development teams can build and deploy macOS applications faster in a secure,
on-demand build environment integrated with GitLab CI/CD.
Try it out today by using the macos-26-xcode-26 image in your .gitlab-ci.yml file.
GitLab Runner 18.10
- Available in: Free, Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation
We’re also releasing GitLab Runner 18.10 today!
GitLab Runner is the highly-scalable build agent that runs your CI/CD jobs and sends the results back to a GitLab instance.
GitLab Runner works in conjunction with GitLab CI/CD, the open-source continuous integration service included with GitLab.
What’s New:
Bug Fixes:
The list of all changes is in the GitLab Runner CHANGELOG.