Skip to content

Commit 000f2ca

Browse files
Potential fix for code scanning alert no. 3: Workflow does not contain permissions (#118)
Potential fix for [https://github.com/psake/PowerShellBuild/security/code-scanning/3](https://github.com/psake/PowerShellBuild/security/code-scanning/3) In general, this should be fixed by explicitly defining GITHUB_TOKEN permissions in the workflow, either at the root level (applying to all jobs) or per job, and restricting them to the least privilege required (for a simple test workflow usually `contents: read` is enough). This documents the workflow’s needs and prevents it from gaining broader access if repository or organization defaults change. For this specific workflow in `.github/workflows/test.yml`, the safest, least intrusive fix that preserves existing behavior is to add a root-level `permissions:` block granting only `contents: read`. The existing steps perform a checkout and run a PowerShell script; there is no explicit indication they need to write to the repo, issues, or pull requests. Adding the block directly under the workflow `name:` (before `on:`) is conventional and applies to all jobs unless overridden. No imports or additional methods are required; this is purely a YAML configuration change within the workflow file. _Suggested fixes powered by Copilot Autofix. Review carefully before merging._ Signed-off-by: Gilbert Sanchez <me@gilbertsanchez.com> Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
1 parent 5e25263 commit 000f2ca

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

.github/workflows/test.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
11
name: Test
2+
permissions:
3+
contents: read
24
on:
35
push:
46
branches: [ $default-branch ]

0 commit comments

Comments
 (0)