Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Set minimum permissions to workflows #132

Closed
gabibguti opened this issue Mar 20, 2023 · 0 comments · Fixed by #133
Closed

Set minimum permissions to workflows #132

gabibguti opened this issue Mar 20, 2023 · 0 comments · Fixed by #133

Comments

@gabibguti
Copy link

Setting minimum permissions to workflows is important to keep your repository safe against supply-chain attacks. I would like us to enforce least privilege access to workflows in the repository, similar to uber-go/multierr#76. The minimum permissions for the workflows, fossa.yaml and go.yml, would be contents: read. Let me know if you agree with the changes and if you'd like to implement them, as done in uber-go/multierr, or otherwise I'm available to implement too.

Additional context

I'm Gabriela and I work on behalf of Google and the OpenSSF suggesting supply-chain security changes :)

sywhang added a commit to sywhang/atomic that referenced this issue Mar 20, 2023
Set only read permission on CI workflows since they don't need write access.

Fixes uber-go#132.
r-hang pushed a commit that referenced this issue Mar 20, 2023
Set only read permission on CI workflows since they don't need write access.

Fixes #132.
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant