Skip to content

Commit 215cc73

Browse files
iaminaweclaude
andcommitted
Use ORG_MEMBER_CHECK_TOKEN for organization membership verification
This addresses the CodeRabbit review feedback regarding GITHUB_TOKEN permissions. The default GITHUB_TOKEN does not have org-level "Members" read permission required to query organization membership. Changes: - Updated both workflows to use ORG_MEMBER_CHECK_TOKEN secret - This token must be a PAT or GitHub App token with read:org scope Setup Required: A repository administrator must create and add the ORG_MEMBER_CHECK_TOKEN secret with appropriate permissions. See PR description for instructions. Fixes: Critical permission issue identified in CodeRabbit review 🤖 Generated with Claude Code Co-Authored-By: Claude <[email protected]>
1 parent fce9ad5 commit 215cc73

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

.github/workflows/claude.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ jobs:
3838
- name: Check authorization
3939
id: check
4040
env:
41-
GH_TOKEN: ${{ secrets.GITHUB_TOKEN }}
41+
GH_TOKEN: ${{ secrets.ORG_MEMBER_CHECK_TOKEN }}
4242
run: |
4343
ACTOR="${{ github.actor }}"
4444

.github/workflows/opencode-gpt-5-codex.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ jobs:
3838
- name: Check authorization
3939
id: check
4040
env:
41-
GH_TOKEN: ${{ secrets.GITHUB_TOKEN }}
41+
GH_TOKEN: ${{ secrets.ORG_MEMBER_CHECK_TOKEN }}
4242
run: |
4343
ACTOR="${{ github.actor }}"
4444

0 commit comments

Comments
 (0)