Aspects include monitoring accesses to computer source code. A method includes detecting an access, by a user, to a source code repository. It is determined whether the access is consistent with a history of accesses by the user to the source code repository. Based on determining that the access is not consistent with the history of accesses by the user, the access is analyzed for a reason for the user to perform the access. The analyzing is based on information about the user and information about the access. A notification of the access is generated based on the analyzing resulting in an absence of a reason for the user to perform the access.