You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Adding minimum permissions to your workflows help keep your repository safe against supply-chain attacks. I see the repo only uses one workflow test.yml for testing and this workflow just needs contents: read permission to run actions/checkout. If you agree with these changes, I can open a PR!
Adding minimum permissions to your workflows help keep your repository safe against supply-chain attacks. I see the repo only uses one workflow
test.yml
for testing and this workflow just needscontents: read
permission to runactions/checkout
. If you agree with these changes, I can open a PR!This is considered good-practice and recommended by GitHub itself and other security tools, such as Scorecards and StepSecurity.
Additional context
I'm Gabriela and I work on behalf of Google and the OpenSSF suggesting supply-chain security changes :)
The text was updated successfully, but these errors were encountered: