graphql-tools icon indicating copy to clipboard operation
graphql-tools copied to clipboard

GitHub Workflows security hardening

Open sashashura opened this issue 3 years ago • 2 comments

This PR adds explicit permissions section to workflows. This is a security best practice because by default workflows run with extended set of permissions (except from on: pull_request from external forks). By specifying any permission explicitly all others are set to none. By using the principle of least privilege the damage a compromised workflow can do (because of an injection or compromised third party tool or action) is restricted. It is recommended to have most strict permissions on the top level and grant write permissions on job level case by case.

sashashura avatar Sep 25 '22 21:09 sashashura

⚠️ No Changeset found

Latest commit: 54299b1809322a1e9b3251060aa4f705c35ed811

Merging this PR will not cause a version bump for any packages. If these changes should not result in a new version, you're good to go. If these changes should result in a version bump, you need to add a changeset.

This PR includes no changesets

When changesets are added to this PR, you'll see the packages that this PR includes changesets for and the associated semver types

Click here to learn what changesets are, and how to add one.

Click here if you're a maintainer who wants to add a changeset to this PR

changeset-bot[bot] avatar Sep 25 '22 21:09 changeset-bot[bot]

@sashashura is attempting to deploy a commit to the The Guild Team on Vercel.

A member of the Team first needs to authorize it.

vercel[bot] avatar Sep 25 '22 21:09 vercel[bot]