Skip to content

Conversation

@kdev
Copy link
Member

@kdev kdev commented Oct 25, 2025

Potential fix for https://github.com/LEDBrain/Community-Service/security/code-scanning/6

To resolve the flagged issue, add an explicit permissions block to the workflow. This can be done globally at the root level to apply to all jobs, or individually at the job level for finer control. Since neither lint nor build-project jobs require write permissions, the ideal minimal fix is to add a global permissions block at the root of .github/workflows/development.yml. This block should set contents: read, which is sufficient for fetching code (as used by checkout), but prevents accidental privilege escalation. Place the following block directly beneath the name: key (before on:), as per GitHub Actions syntax. No additional code modifications or dependencies are required.


Suggested fixes powered by Copilot Autofix. Review carefully before merging.

…ntain permissions

Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
@kdev kdev closed this Oct 25, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant