Skip to content

Potential fix for code scanning alert no. 7: Workflow does not contain permissions#25

Merged
achamayou merged 2 commits intomainfrom
alert-autofix-7
Feb 12, 2026
Merged

Potential fix for code scanning alert no. 7: Workflow does not contain permissions#25
achamayou merged 2 commits intomainfrom
alert-autofix-7

Conversation

@achamayou
Copy link
Member

Potential fix for https://github.com/microsoft/merklecpp/security/code-scanning/7

In general, the fix is to add an explicit permissions block declaring the least privileges the workflow needs. For a standard CodeQL analysis workflow that only checks out code and runs analysis, that typically means read access to repository contents (contents: read) and allowing the CodeQL action to upload security analysis results (security-events: write). These permissions can be set at the workflow root (applies to all jobs) or on the individual job.

For this specific file .github/workflows/codeql-analysis.yml, the minimal, non-breaking change is to add a permissions block under the analyze job (indented to match other job keys like name, runs-on, and strategy). This keeps the permissions local to this job and avoids affecting any other jobs that might be added later. Insert:

    permissions:
      contents: read
      security-events: write

between runs-on: ubuntu-latest (line 15) and strategy: (line 17). No additional imports or definitions are needed because this is purely a YAML configuration change. Existing behavior of the CodeQL workflow remains the same, while the GITHUB_TOKEN is now explicitly restricted to the minimum needed scopes.

Suggested fixes powered by Copilot Autofix. Review carefully before merging.

…n permissions

Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
@achamayou achamayou marked this pull request as ready for review February 12, 2026 11:04
@achamayou achamayou merged commit 623d37b into main Feb 12, 2026
10 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant