fix(repo): Harden workflow permissions#8217
Conversation
Restrict GITHUB_TOKEN to read-only content access. The workflow only checks out code and runs cleanup scripts — no write permissions needed. Fixes code scanning alert #234 (actions/missing-workflow-permissions). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Restrict GITHUB_TOKEN to read-only content access. The workflow only checks out code, builds, runs integration tests, and reports to Slack via webhook — no write permissions needed. Fixes code scanning alert #184 (actions/missing-workflow-permissions). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
…ons job Restrict GITHUB_TOKEN to read-only content access for this job. It only checks out code and caches node_modules — no write permissions needed. Fixes code scanning alert #225 (actions/missing-workflow-permissions). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Prevent the checked-out PR code from accessing the git credential used to push to the base repository. The snapshot-release job checks out untrusted PR code via issue_comment trigger; this limits credential exposure without changing the existing org-membership security gate. Mitigates code scanning alerts #229, #230, #231 (actions/untrusted-checkout). Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
|
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
@clerk/agent-toolkit
@clerk/astro
@clerk/backend
@clerk/chrome-extension
@clerk/clerk-js
@clerk/dev-cli
@clerk/expo
@clerk/expo-passkeys
@clerk/express
@clerk/fastify
@clerk/hono
@clerk/localizations
@clerk/nextjs
@clerk/nuxt
@clerk/react
@clerk/react-router
@clerk/shared
@clerk/tanstack-react-start
@clerk/testing
@clerk/ui
@clerk/upgrade
@clerk/vue
commit: |
📝 WalkthroughWalkthroughThree GitHub Actions workflow files were modified to enhance security configurations. The 🚥 Pre-merge checks | ✅ 3✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. Comment |
permissions: { contents: read }to three workflow files/jobs that were missing permission blocks, giving theGITHUB_TOKENunnecessarily broad default access:e2e-cleanups.ymlnightly-checks.ymlcache-for-alternate-node-versionsjob inrelease.ymlpersist-credentials: falseto the snapshot-release checkout step inrelease.ymlto prevent checked-out PR code from accessing git credentialsSummary by CodeRabbit