Skip to content

Conversation

@rocktavious
Copy link
Collaborator

Potential fix for https://github.com/OpsLevel/opslevel-go/security/code-scanning/7

To fix the problem, add a permissions block to the workflow to explicitly set the minimum required permissions for the GITHUB_TOKEN. The best practice is to set this at the workflow root (top-level), so it applies to all jobs unless overridden. If the workflow only needs to read repository contents (which is typical for security scanning jobs), set contents: read. If more permissions are needed, they can be added as required. The change should be made at the top level of .github/workflows/security.yml, immediately after the name: line and before the on: block.


Suggested fixes powered by Copilot Autofix. Review carefully before merging.

…n permissions

Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
@rocktavious rocktavious marked this pull request as ready for review August 5, 2025 17:03
@rocktavious rocktavious merged commit e774ea6 into main Aug 5, 2025
4 checks passed
@rocktavious rocktavious deleted the alert-autofix-7 branch August 5, 2025 17:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants