Skip to content

Conversation

thpierce
Copy link
Contributor

Potential fix for https://github.com/aws-observability/aws-application-signals-test-framework/security/code-scanning/12

The best way to address this issue is to explicitly set permissions at the workflow (root) level, so that all jobs default to these minimal permissions unless otherwise overridden in a particular job. For typical CI workflows like this, contents: read is usually sufficient, as no job writes to the repository, handles issues, or manipulates pull requests. This ensures that the GITHUB_TOKEN associated with all jobs is as restricted as possible.

Changes required:

  • Add a permissions: block at the root of .github/workflows/pr-build.yml (just below name: ... and above on:).
  • Set contents: read.

No imports, additional libraries, or other definitions are required for this change, as it is a YAML configuration fix.


Suggested fixes powered by Copilot Autofix. Review carefully before merging.

…in permissions

Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
@thpierce thpierce closed this Oct 14, 2025
@thpierce thpierce deleted the alert-autofix-12 branch October 14, 2025 20:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant