-
-
Notifications
You must be signed in to change notification settings - Fork 1k
ci: Add GitHub token permissions for workflows #14240
Conversation
Signed-off-by: Varun Sharma <[email protected]>
Change in general looks good (you can probably get away with Can you please however submit the PR to https://github.com/Homebrew/homebrew-cask instead? It will auto-sync here when merged. |
ok, I will submit the PR to https://github.com/Homebrew/homebrew-cask |
Thanks! Btw, your list of 100 critical projects should probably be referencing homebrew-cask and not homebrew-cask-versions (this repo). |
Created PR at Homebrew/homebrew-cask#127104 |
I can pass on the message to the OSSF Securing Critical Projects working group. I took the spreadsheet of top critical projects from there. https://github.com/ossf/wg-securing-critical-projects How should I explain it to them? Is |
I think that is a mistake. Also, if you compute the current criticality scores, |
No. Only CI, documentation, issue templates etc. |
This PR adds minimum token permissions for the GITHUB_TOKEN using https://github.com/step-security/secure-workflows.
GitHub recommends defining minimum GITHUB_TOKEN permissions for securing GitHub Actions workflows
This project is part of the top 100 critical projects as per OpenSSF (https://github.com/ossf/wg-securing-critical-projects), so fixing the token permissions to improve security.
Signed-off-by: Varun Sharma [email protected]
Important: Do not tick a checkbox if you haven’t performed its action. Honesty is indispensable for a smooth review process.
In the following questions
<cask>
is the token of the cask you're submitting.After making all changes to a cask, verify:
brew audit --cask --online <cask>
is error-free.brew style --fix <cask>
reports no offenses.Additionally, if adding a new cask:
brew audit --new-cask <cask>
worked successfully.brew install --cask <cask>
worked successfully.brew uninstall --cask <cask>
worked successfully.