Agentic Core
Default model for GitLab Duo Agentic Chat updated from Haiku 4.5 to Sonnet 4.6
We’ve made an update to improve your Agentic Chat experience in GitLab. The default model for Agentic Chat was upgraded from Claude Haiku 4.5 to Claude Sonnet 4.6, hosted on Vertex AI. Claude Sonnet 4.6 offers improved reasoning and response quality but uses a higher GitLab Credit multiplier than Haiku 4.5.
You can select an alternative model, including Haiku, using the model selection setting. If you’ve already selected a specific model, your choice is preserved. This update only affects the default and will not override any existing selections. For information about credit multipliers by model, see the GitLab Credits documentation.
- Available in: Free, Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related issue
You can now configure tool options and parameter values directly in your custom flow definitions to supersede the LLM default values. This gives you more precise, consistent control over how tools behave within a custom flow, making it easier to enforce guardrails and specific parameter values across that flow.
GitLab Duo Agent Platform now supports Mistral AI as an LLM platform for self-hosted model deployments. GitLab Self-Managed customers can configure Mistral AI alongside existing supported platforms, including AWS Bedrock, Google Vertex AI, Azure OpenAI, Anthropic, and OpenAI. This gives teams more choice in how they run AI-powered features.
Scale and Deployments
View historical months in GitLab Credits dashboard
- Available in: Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related issue
The GitLab Credits dashboard in Customers Portal now supports historical month navigation. Billing managers can browse past billing months to review daily usage trends, compare consumption patterns across periods, and reconcile usage with invoices. Previously, the dashboard only displayed the current billing month. With this improvement, administrators can make more informed decisions about credit allocation and forecast future needs based on historical data.
Set subscription-level usage cap for GitLab Credits
- Available in: Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation
Administrators can now set a monthly usage cap for On-Demand Credits at the subscription level. When total on-demand credit consumption reaches the configured cap, GitLab Duo Agent Platform access is automatically suspended for all users on that subscription until the next billing period begins or the admin adjusts the cap. This setting gives organizations a hard guardrail against unexpected overage bills, removing a key barrier to broader Agent Platform rollout. Caps reset automatically each billing period, and administrators receive an email notification when the cap is reached.
Set per-user GitLab Credits cap
- Available in: Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation
Administrators can now set an optional per-user usage cap for GitLab Credits per billing period. When an individual user’s total credit consumption reaches the configured limit, GitLab Duo Agent Platform access is suspended only for that user, while other users continue unaffected. This prevents any single user from consuming a disproportionate share of the organization’s credit pool, and gives administrators fine-grained control over usage distribution. Per-user usage caps work alongside subscription-level usage caps, by applying the cap that is reached first.
Linux package improvements
The GitLab
backup Rake task for Linux package installations and the
backup-utility for Cloud Native (Helm) installations now support the
container registry metadata database. You can now back up references to blobs, manifests, tags, and other data stored in the metadata database, enabling recovery in the event of malicious or accidental data corruption.
New navigation experience for groups in Explore
- Available in: Free, Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related epic
We’re excited to announce improvements to the groups list in Explore, making it easier to discover groups across your GitLab instance.
The redesigned interface introduces a tabbed layout with two views:
- Active tab: Browse all accessible groups, helping you discover relevant communities and projects.
- Inactive tab: View archived groups and groups pending deletion for visibility into group lifecycle status.
These changes streamline group discovery and provide clearer visibility into which groups are available to join.
Asynchronous transfer of projects
- Available in: Free, Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related epic
In previous versions of GitLab, transfers of large groups and projects could timeout. As we move groups and projects to use a unified state model for operations such as transfer, archive, and deletion, you get more consistent behavior, better visibility into state history and audit details, and fewer timeouts, specifically, for long running transfer operations through asynchronous processing.
Unified DevOps and Security
ClickHouse is generally available for Self-Managed deployments
- Available in: Free, Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated
- Links: Documentation | Related issue
For GitLab Self-Managed instances, we now have improved recommendations and configuration guidance for the GitLab ClickHouse integration. Customers have options to bring their own cluster, or use the ClickHouse Cloud (recommended) setup option. This integration powers multiple dashboards and unlocks access to various API endpoints within the analytics space.
This scalable, high-performance database is part of the larger architectural improvements planned for the GitLab analytics infrastructure.
- Available in: Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated
- Add-ons: Duo Pro, Duo Enterprise
- Links: Documentation | Related epic
The GitLab Duo and SDLC trends dashboard delivers improved analytics capabilities to measure the impact of GitLab Duo
on software delivery. The dashboard now includes new single stat panels for monthly Agent Platform unique users and Agentic Chat sessions.
Additionally, metrics previously displayed as a % usage compared to seat assignments have been updated to strictly report usage counts.
This change resolves the
issue where counts were missing Agent Platform usage controlled under the new usage billing model.
GLQL now has access to projects, pipelines, and jobs data sources
- Available in: Free, Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated
- Links: Documentation
The
GitLab Query Language (GLQL) now has access to three new data sources: projects, pipelines, and jobs. These new data sources are also available as embedded views, letting teams surface pipeline results, job statuses, and project overviews directly in wikis, issue and merge request descriptions, and repository Markdown files.
GLQL also powers the
Data Analyst Agent. With these new types, the agent can inspect CI/CD job results, debug failures, and provide detailed overviews of pipeline execution, as well as provide an accurate overview of projects in a namespace.
Dependency resolution for Maven and Python SBOM scanning
- Available in: Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related epic
GitLab dependency scanning using SBOM now supports generating a dependency graph automatically for Maven and Python projects.
Previously, dependency scanning required users to provide a lock file or a graph file to get an accurate dependency analysis.
Now, when a lock file or graph file is not available, the analyzer automatically attempts to generate one.
This improvement makes it easier for Maven and Python projects to enable dependency scanning without requiring a lock file.
Incremental scanning for Advanced SAST
- Available in: Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related epic
You can now perform incremental scans that analyze only changed parts of the codebase with GitLab Advanced SAST, significantly reducing scan times compared to full repository scans. This feature is a further iteration of diff-based scanning, because it produces full results for codebases.
By scanning just the code that has changed rather than the entire codebase, your teams can integrate security testing more seamlessly into their development workflow without sacrificing speed or adding friction.
Unverified vulnerabilities (Beta)
- Available in: Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related epic
Advanced SAST can now surface unverified vulnerabilities (findings that cannot be fully traced from source to sink) directly in the vulnerability report. Enable this feature if you have a higher tolerance for false positives over false negatives.
This feature is in beta status. Provide feedback in issue 596512.
Kubernetes 1.35 support
- Available in: Free, Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related issue
GitLab now fully supports Kubernetes version 1.35. If you want to deploy your applications to Kubernetes
and access all features, upgrade your connected clusters to the most recent version.
For more information, see
supported Kubernetes versions for GitLab features.
You can now set the container registry metadata database to prefer mode, a new configuration option alongside the existing true and false values. In prefer mode, the registry automatically detects whether it should use the metadata database or fall back to legacy storage based on the current state of your installation.
If your registry has existing filesystem metadata that has not been imported to the database, the registry continues to use legacy storage until you complete a metadata import. If the database is already in use, or on a fresh installation, the registry uses the database directly.
In a later release, prefer mode will become the default for new Linux package installations. Existing installations will not be affected. For more information, see issue 595480.
- Available in: Free, Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related issue
Teams publishing Terraform modules through the built-in GitLab Terraform module registry had
no way to restrict who could push new module versions. Package protection rules supported
several package formats but did not include terraform_module, leaving infrastructure
teams without a project-level push control.
You can now create package protection rules scoped to terraform_module, restricting push
access based on minimum role. Support is available in the UI package type dropdown, the
REST API, the GraphQL API, and the GitLab Terraform provider resource.
Release evidence now includes packages
- Available in: Free, Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related issue
When creating a GitLab Release, packages published to the package registry were not
automatically associated with it. Teams had to manually construct package URLs and attach
them as release links through the API or pipeline scripts, adding friction and risk of
incomplete release records.
GitLab now automatically includes packages in release evidence when the package version
matches the release tag. This creates a verifiable, auditable link between your release and
its associated packages without any manual steps, keeping source code, artifacts, and
packages together in one complete release snapshot.
- Available in: Free, Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related issue
The wiki sidebar toggle is now positioned on the left side, directly next to the sidebar
it controls.
When the sidebar is collapsed, the toggle remains visible as a floating
control so you can reopen it without scrolling back to the top of the page.
Sticky action bar on wiki pages
- Available in: Free, Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related issue
The action bar on wiki pages is now sticky, so it remains visible as you scroll
through a page. Previously, you had to scroll back to the top to access actions
like editing, viewing page history, or managing templates. Now the page title
and key actions, including Edit, New page, Templates, Page history, and more,
stay within reach no matter how far down the page you are.
Epic weights
- Available in: Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related epic
Epics now support weights, making it easier to estimate and prioritize large-scale
initiatives during planning.
Before breaking down an epic into child issues, you can assign a preliminary weight
to represent your initial estimate.
As you decompose the epic, the weight automatically updates to reflect the rolled-up total
from all child issues.
This is consistent with how weight rollup works for issues and tasks.
On the epic detail page, you can see both the preliminary weight and the rolled-up weight
from child issues, giving you the insight needed to refine estimates over time.
Block merge requests with high exploitability risk
- Available in: Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related epic
Previously, merge request (MR) approval policies could block MRs based on vulnerability severity, but not all vulnerabilities carry the same risk. CVSS severity alone doesn’t tell you whether a CVE is being exploited or how likely exploitation is. This leads to noisy approval policies and wasted time for developers and security teams.
You can now configure MR approval policies using Known Exploited Vulnerability (KEV) and Exploit Prediction Scoring System (EPSS) data. Block or require approval when a finding is in the KEV catalog (actively exploited in the wild), or when its EPSS score is above a threshold. Policy violations in the MR include KEV and EPSS context so developers understand why the security gate was triggered.
This gives security teams precise control over which findings block or warn, reduces alert fatigue, and keeps enforcement aligned with the current threat landscape.
Assign CVSS 4.0 scores to vulnerabilities
- Available in: Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related epic
CVSS 4.0 is the latest version of the industry standard used to assess and rate the severity of a vulnerability. You can now view and access CVSS 4.0 score in the UI, including the vulnerability details page and the vulnerability report. You can also query the score using the API.
Improved row interaction in the vulnerability report
- Available in: Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related issue
Previously, you had to select the row description to navigate to a vulnerability details page from the vulnerability report.
You can now select anywhere in the row to go directly to its details. Link styling for the vulnerability description and file location only appears when you hover over each link, and keyboard navigation has been improved.
These changes make the vulnerability report more intuitive and accessible.
Export a security dashboard as a PDF
- Available in: Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related epic
You can export the security dashboard as a PDF for use in reports and presentations. The export captures the current state of all of the charts and panels in the dashboard, including any active filters.
SAST scanning in security configuration profiles
- Available in: Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related epic
In GitLab 18.9, we introduced security configuration profiles with the Secret Detection - Default profile. In GitLab 18.11, profiles now extend to SAST with the Static Application Security Testing (SAST) - Default profile, giving you a unified control surface to apply standardized static analysis coverage across all your projects without touching a single CI/CD configuration file.
The profile activates two scan triggers:
- Merge Request Pipelines: Automatically runs a SAST scan each time new commits are pushed to a branch with an open merge request. Results only include new vulnerabilities introduced by the merge request.
- Branch Pipelines (default only): Runs automatically when changes are merged or pushed to the default branch, providing a complete view of your default branch’s SAST posture.
Security attribute filters in group security dashboards
- Available in: Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related epic
You can now filter the results in a group security dashboard based on the security attributes that you have applied to the projects in that group.
The available security attributes include the following:
- Business impact
- Application
- Business unit
- Internet exposure
- Location
Security Manager role (Beta)
- Available in: Free, Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation
The Security Manager role is now available as a beta feature, providing a new default set of permissions designed specifically for security professionals. Security teams no longer need Developer or Maintainer roles to access security features, eliminating over-privileging concerns while maintaining separation of duties.
Users with the Security Manager role have the following access:
- Vulnerability management: View, triage, and manage vulnerabilities across groups and projects, including vulnerability reports and security dashboards.
- Security inventory: View a group’s security inventory to understand scanner coverage across all projects.
- Security configuration profiles: View security configuration profiles for a group.
- Compliance tools: View audit events, compliance center, compliance frameworks, and dependency lists for a group or project.
- Secret push protection: Enable secret push protection for a group.
- On-demand DAST: Create and run on-demand DAST scans for a group.
To get started, go to a group and select Manage > Members to invite and assign members to the Security Manager role.
Identifier list popover in the vulnerability report
- Available in: Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation | Related issue
The vulnerability report now shows the primary CVE identifier as a clickable link in each row. When multiple identifiers exist, a "+N more" popover lists all of the identifiers. Each identifier in the list links to its external reference (for example, in the CVE, CWE, or WASC databases) so you can quickly access more details without leaving the report.
GitLab Runner 18.11
- Available in: Free, Premium, Ultimate
- Offerings: GitLab Self-Managed, GitLab.com, GitLab Dedicated, GitLab Dedicated for Government
- Links: Documentation
We’re also releasing GitLab Runner 18.11 today! GitLab Runner is the highly-scalable build agent that runs your CI/CD jobs and sends the results back to a GitLab instance. GitLab Runner works in conjunction with GitLab CI/CD, the open-source continuous integration service included with GitLab.
What’s New:
Bug Fixes:
The list of all changes is in the GitLab Runner CHANGELOG.