-
Notifications
You must be signed in to change notification settings - Fork 90
[BRE-1333] Added permissions to token generation step to limit scope of token #929
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
[BRE-1333] Added permissions to token generation step to limit scope of token #929
Conversation
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #929 +/- ##
=====================================
Coverage 6.87% 6.87%
=====================================
Files 67 67
Lines 2791 2791
Branches 481 481
=====================================
Hits 192 192
Misses 2585 2585
Partials 14 14 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
New Issues (2)Checkmarx found the following issues in this Pull Request
|
c8ae77c to
23d0a72
Compare
|
Claude finished @gitclonebrian's task —— View job Review CompleteSummary of ChangesThis PR adds the FindingsFinding 1: 💭 PR description could better explain the "why" behind this change Suggested improvementsThe current objective states "Added Consider expanding to something like: ## 📔 Objective
Added explicit `permission-contents: write` parameter to the GitHub App token generation step. This follows the principle of least privilege by requesting only the specific permission needed for version bump commits, rather than inheriting all permissions available to the GitHub App. This reduces the blast radius if the token were to be compromised during workflow execution.Finding 2: The job has
According to the action's documentation, the Finding 3: 🎨 Consider documenting the security model in workflow comments Adding a brief comment above the token generation step would help future maintainers understand the security considerations: # Generate a scoped GitHub App token with minimal permissions.
# Only requests 'contents:write' permission needed for version bump commits.
- name: Generate GH App token
uses: actions/create-github-app-token@df432ceedc7162793a195dd1713ff69aefc7379e # v2.0.6Good Practices Observed
Action Items
|


🎟️ Tracking
BRE-1333
📔 Objective
Added
contents:writepermission to app token generation step to limit scope of token.Successfully tested workflow here.
📸 Screenshots
⏰ Reminders before review
🦮 Reviewer guidelines
:+1:) or similar for great changes:memo:) or ℹ️ (:information_source:) for notes or general info:question:) for questions:thinking:) or 💭 (:thought_balloon:) for more open inquiry that's not quite a confirmed issue and could potentially benefit from discussion:art:) for suggestions / improvements:x:) or:warning:) for more significant problems or concerns needing attention:seedling:) or ♻️ (:recycle:) for future improvements or indications of technical debt:pick:) for minor or nitpick changes