Skip to content

Conversation

@jiaren-wu
Copy link
Contributor

Potential fix for https://github.com/actions/actions-runner-controller/security/code-scanning/5

To fix the problem, add an explicit permissions block to the workflow to restrict the permissions of the GITHUB_TOKEN as recommended. This can be done by adding the permissions: key at the root of the workflow YAML (immediately after the name: and before on:), or per-job if different jobs need different scopes. In this case, the workflow does not require repository write permissions, so restricting to contents: read will suffice and follows best practices. The edit should be made near the top of .github/workflows/arc-release-runners.yaml, after the name: field and before the on: trigger.


Suggested fixes powered by Copilot Autofix. Review carefully before merging.

…n permissions

Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants