Skip to content

Enforce least privilege and harden workflow security#126

Open
JingMatrix wants to merge 1 commit into
masterfrom
security
Open

Enforce least privilege and harden workflow security#126
JingMatrix wants to merge 1 commit into
masterfrom
security

Conversation

@JingMatrix
Copy link
Copy Markdown
Owner

  • Explicitly set top-level permissions to 'contents: read' to follow security best practices.
  • Set 'persist-credentials: false' in the checkout step to prevent the GITHUB_TOKEN from being stored on the runner disk.

I have now also set Read repository contents and packages permissions for project settings Workflow permissions.

- Explicitly set top-level permissions to 'contents: read' to follow security best practices.
- Set 'persist-credentials: false' in the checkout step to prevent the GITHUB_TOKEN from being stored on the runner disk.

I have now also set `Read repository contents and packages permissions` for project settings `Workflow permissions`.
@TotallyAvailable
Copy link
Copy Markdown

TotallyAvailable commented Apr 7, 2026

https://github.com/dependabot/dependabot-core/commit/c69174a5a3ca14c953e2ae96a05a5d3b725a1d58

Again, literally part of the changelog https://github.com/dependabot/dependabot-core/releases/tag/v0.367.0

  • Imagine (GitHub, as the number one open source platform) defaulting to such insane settings.

  • Imagine not telling projects used across the entire supply chain about it.

  • .... ?

  • How many more breaches does it take to change a lightbulb return to sane defaults ?

  • none of the "AI" based coding agents catching that stuff either ? ...

(Just a follow-up with the specific commit after I forgot to link it again...)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants