Skip to content

Conversation

@hakalb
Copy link
Member

@hakalb hakalb commented Sep 29, 2025

Potential fix for https://github.com/codeware-sthlm/codeware/security/code-scanning/8

To resolve the issue, add an explicit permissions block to the workflow file. Place this block at the top workflow level (after name: and on:), so it applies to all jobs by default. Since the jobs only require access to check out the source code and upload/download artifacts (which do not require write access to the repository), the minimum required is contents: read. If none of the jobs require write access to issues, pull-requests, or other resources, there is no need to add further permissions. If future jobs need broader access, their permissions can be overridden at the job level.

Steps:

  • Insert a permissions: section after the on: block (before env: or any other top-level keys).
  • Set it to contents: read.

Suggested fixes powered by Copilot Autofix. Review carefully before merging.

…n permissions

Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
Signed-off-by: Håkan Ströberg <hakan.stroberg@codeware.se>
@bolt-new-by-stackblitz
Copy link

Review PR in StackBlitz Codeflow Run & review this pull request in StackBlitz Codeflow.

@nx-cloud
Copy link

nx-cloud bot commented Sep 29, 2025

View your CI Pipeline Execution ↗ for commit a0e0d43

Command Status Duration Result
nx-cloud record -- nx format:check ✅ Succeeded 13s View ↗

☁️ Nx Cloud last updated this comment at 2025-09-29 22:22:34 UTC

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

2 participants