- Notifications
You must be signed in to change notification settings - Fork396
Closed
Description
This repo's automated workflows currently run with write-all tokens. This puts the project at risk of supply-chain attacks.GitHub recommends ensuring all workflows run with minimal permissions.
I've taken a look at the workflows and they don't need such broad permissions.
This issue can be solved in two ways:
- add top-level read-only permissions to all workflows; and/or
- set the default token permissions to read-only in the repo settings.
I'll be sending a PR along with this issue that sets the top-level permissions (and grants additional permissions for the jobs that need them). If you instead (or also) wish to modify the default token permissions:
- Open the repo settings
- Go toActions > General
- Under "Workflow permissions", set them to "Read repository contents and packages permissions"
Disclosure: My name is Pedro and I work with Google and theOpen Source Security Foundation to improve the supply-chain security of important open-source projects.
Metadata
Metadata
Assignees
Labels
No labels