Skip to content

Commit b588d2e

Browse files
authored
Add warning for write level rights with regards to repo secrets (github#15553)
1 parent 0be600b commit b588d2e

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

content/actions/security-guides/security-hardening-for-github-actions.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,12 @@ To help prevent accidental disclosure, {% data variables.product.product_name %}
4848
- **Consider requiring review for access to secrets**
4949
- You can use required reviewers to protect environment secrets. A workflow job cannot access environment secrets until approval is granted by a reviewer. For more information about storing secrets in environments or requiring reviews for environments, see "[Encrypted secrets](/actions/reference/encrypted-secrets)" and "[Using environments for deployment](/actions/deployment/using-environments-for-deployment)."
5050

51+
{% warning %}
52+
53+
**Warning**: Any user with write access to your repository has read access to all secrets configured in your repository. Therefore, you should ensure that the credentials being used within workflows have the least privileges required.
54+
55+
{% endwarning %}
56+
5157
## Using `CODEOWNERS` to monitor changes
5258

5359
You can use the `CODEOWNERS` feature to control how changes are made to your workflow files. For example, if all your workflow files are stored in `.github/workflows`, you can add this directory to the code owners list, so that any proposed changes to these files will first require approval from a designated reviewer.

0 commit comments

Comments
 (0)