Overview
We need to change the permissions for the default GITHUB_TOKEN from read/write to read only per GitHub's recommendation for security best practice.
Details
Before proceeding, read the explainer below.
We need to audit each of our workflows to identify exactly what permissions are needed at each level of the workflow, i.e. overall, job-level, and step-level.
This issue has three objectives:
- First, we will reduce the permissions of the default
GITHUB_TOKEN.
- At the top level of each workflow's YAML explicitly state the default token's permissions:
# Set defaults for GITHUB_TOKEN
permissions:
contents: read
issues: read
- Next, we will analyze and test each workflow to check whether additional permissions are required at the step-level to ensure each workflow functions as expected, and note whether the permission requires a PAT.
- This information will be itemized on a spreadsheet for each step of each workflow.
- see additional comments and "Permissions audit" following
TODO
Action Items
Resources/Instructions
Overview
We need to change the permissions for the default
GITHUB_TOKENfrom read/write to read only per GitHub's recommendation for security best practice.Details
Before proceeding, read the explainer below.
We need to audit each of our workflows to identify exactly what permissions are needed at each level of the workflow, i.e. overall, job-level, and step-level.
This issue has three objectives:
GITHUB_TOKEN.TODO
Action Items
check-closed-issue-for-linked-pr.yml#8579codeql-create-issues.yml#8580codeql.yml#8581flag-issues-unlabeled-after-deletion.yml#8582lint-scss.yml#8583move-closed-issues.yaml#8584pr-verification.yml#8585schedule-daily-1100.yml#8586update-label-directory.ymlandflag-issues-unlabeled-after-deletion.yml#8587vrms-data.yml#8588pr-instructions.ymlandwr-pr-instructions.yml#8589pull-request-trigger.ymlandwr-pull-request-trigger.yml#8590schedule-monthly.ymlandwr-schedule-monthly.yml#8591set-pr-labels.yamlandwr-set-pr-labels.yaml#8592Resources/Instructions