boahc077 opened a new pull request, #554:
URL: https://github.com/apache/tomcat/pull/554

   ### Description
   This PR adds minimum token permissions for the GITHUB_TOKEN in GitHub 
Actions workflows using 
[secure-workflows](https://github.com/step-security/secure-workflows).
   
   The GitHub Actions workflow has a GITHUB_TOKEN with write access to multiple 
scopes. Here is an example of the permissions in one of the workflow runs:
   
https://github.com/apache/tomcat/actions/runs/3161137642/jobs/5146391221#step:1:19
   
   After this change, the scopes will be reduced to the minimum needed for the 
following workflow:
   
   - ci.yml
   
   
   ### Motivation and Context
   
   - This is a security best practice, so if the GITHUB_TOKEN is compromised 
due to a vulnerability or compromised Action, the damage will be reduced.
   - [GitHub 
recommends](https://docs.github.com/en/actions/security-guides/automatic-token-authentication#modifying-the-permissions-for-the-github_token)
 defining minimum GITHUB_TOKEN permissions.
   - The Open Source Security Foundation (OpenSSF) 
[Scorecards](https://github.com/ossf/scorecard) also treats not setting token 
permissions as a high-risk issue. This change will help increase the Scorecard 
score for this repository.
   
   Signed-off-by: Ashish Kurmi <aku...@stepsecurity.io>


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to