Skip to content

Potential fix for code scanning alert no. 39: Workflow does not contain permissions#676

Merged
potiuk merged 1 commit intomainfrom
alert-autofix-39
Apr 6, 2026
Merged

Potential fix for code scanning alert no. 39: Workflow does not contain permissions#676
potiuk merged 1 commit intomainfrom
alert-autofix-39

Conversation

@potiuk
Copy link
Copy Markdown
Member

@potiuk potiuk commented Apr 6, 2026

Potential fix for https://github.com/apache/infrastructure-actions/security/code-scanning/39

In general, the fix is to explicitly declare a permissions: block that restricts the GITHUB_TOKEN to the least privileges needed. For a pure linting/type-check workflow that only reads the repository contents and does not interact with issues, PRs, or other GitHub resources, the minimal useful scope is contents: read. This can be set at the workflow root (applies to all jobs) or at the job level; here a single job exists, so root-level is simplest and future-proof if more jobs are added.

Concretely, in .github/workflows/linting.yml, add a top-level permissions: block after the on: section (or before jobs:) setting contents: read. This does not change functional behavior of the linting steps but ensures the GITHUB_TOKEN cannot be used for write operations on repository contents. No additional imports or methods are needed since this is just YAML configuration.

Suggested fixes powered by Copilot Autofix. Review carefully before merging.

…in permissions

Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
Signed-off-by: Jarek Potiuk <jarek@potiuk.com>
@potiuk potiuk marked this pull request as ready for review April 6, 2026 15:01
@potiuk
Copy link
Copy Markdown
Member Author

potiuk commented Apr 6, 2026

Ths is a no-risk change and it's just best practice to limit permissions in the workflows. Merging.

@potiuk potiuk merged commit 8e86ea3 into main Apr 6, 2026
7 checks passed
@potiuk potiuk deleted the alert-autofix-39 branch April 6, 2026 15:04
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant