Skip to content

ci: declare contents:read on semantic-commit workflow#1273

Open
arpitjain099 wants to merge 1 commit into
mongodb:mainfrom
arpitjain099:chore/declare-workflow-perms-semantic-commit
Open

ci: declare contents:read on semantic-commit workflow#1273
arpitjain099 wants to merge 1 commit into
mongodb:mainfrom
arpitjain099:chore/declare-workflow-perms-semantic-commit

Conversation

@arpitjain099
Copy link
Copy Markdown

Adds a workflow-level permissions: contents: read. The job checks out the repo and runs the linter / format checker; nothing here calls a GitHub API beyond the initial checkout, and the action surfaces failures as the workflow's own check status.

This is supply-chain hygiene anchored in CVE-2025-30066 - the March 2025 tj-actions/changed-files compromise - where a tampered third-party action read GITHUB_TOKEN out of workflow logs and the blast radius equalled whatever scope was issued. Pinning per workflow caps that runtime authority irrespective of the repo or org default, gives drift protection if the default ever widens, and is what OpenSSF Scorecard's Token-Permissions check credits. Small files like this one are the easy place to start the org-wide hygiene work.

YAML validated locally with yaml.safe_load.

Signed-off-by: Arpit Jain <arpitjain099@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants