Skip to content

Commit 0d1f3c6

Browse files
Apply suggestions from code review
1 parent 3fabf02 commit 0d1f3c6

File tree

1 file changed

+0
-14
lines changed

1 file changed

+0
-14
lines changed

content/actions/reference/security/secure-use.md

Lines changed: 0 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -126,22 +126,8 @@ For additional examples and guidance on the risks of untrusted code checkout, se
126126

127127
* OpenSSF Scorecards can help you identify potentially vulnerable workflows, along with other security risks when using {% data variables.product.prodname_actions %}. See [Using OpenSSF Scorecards to secure workflow dependencies](#use-openssf-scorecards-to-detect-potentially-vulnerable-workflows) later in this article.
128128

129-
## Managing permissions for {% data variables.product.prodname_actions %} settings in your organization
130-
131-
You can grant an individual or team in your organization the ability to control certain subsets of settings without granting full administrative control of the organization and its repositories.
132-
133-
{% data reusables.actions.org-roles-for-gh-actions %}
134-
135-
For more information, see [AUTOTITLE](/organizations/managing-peoples-access-to-your-organization-with-roles/about-custom-organization-roles).
136-
137129
{% endif %}
138130

139-
## Using OpenID Connect to access cloud resources
140-
141-
{% data reusables.actions.about-oidc-short-overview %}
142-
143-
{% data reusables.actions.oidc-custom-claims-aws-restriction %}
144-
145131
## Using third-party actions
146132

147133
The individual jobs in a workflow can interact with (and compromise) other jobs. For example, a job querying the environment variables used by a later job, writing files to a shared directory that a later job processes, or even more directly by interacting with the Docker socket and inspecting other running containers and executing commands in them.

0 commit comments

Comments
 (0)