Skip to content

Conversation

@aegilops
Copy link
Contributor

Potential fix for https://github.com/advanced-security/ghe-cross-instance-committers/security/code-scanning/2

To fix this problem, explicitly declare a permissions block within the workflow file. Since the workflow does not appear to need write access to GitHub resources—such as pull requests, issues, or repository contents—the recommended minimal permissions are contents: read, ensuring jobs only have read access to repository data. This should be placed either at the top level of the workflow (to apply to all jobs), or under the individual build job. The simplest, most maintainable approach is to add it at the root of the workflow, directly after the name: and before on:.

No new methods or imports are needed; the change is only to the YAML file.

Suggested fixes powered by Copilot Autofix. Review carefully before merging.

…n permissions

Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
@aegilops aegilops marked this pull request as ready for review December 10, 2025 11:45
@aegilops aegilops merged commit dd9a30e into main Dec 10, 2025
3 of 4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants