Potential fixes for 2 code scanning alerts #56
Merged
+5
−0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
As part of the organization's transition to default read-only permissions for the GITHUB_TOKEN, this pull request addresses a missing permission in the workflow that triggered a code scanning alert.
This PR explicitly adds the required read permissions to align with the default read only permission and is part of a larger effort for this OKR https://github.com/github/security-services/issues/455
Potential fixes for 2 code scanning alerts from the Copilot AutoFix: Missing Permissions in Workflows security campaign:
https://github.com/github/custom-element-boilerplate/security/code-scanning/2
To address the CodeQL warning and follow security best practices, an explicit
permissionsblock should be added specifying the minimal required privileges. Since the shown job only checks out code and publishes to npm (with authentication viaNODE_AUTH_TOKEN), the only required privilege for the GITHUB_TOKEN is likelycontents: read. This fix involves adding apermissions:block at the workflow root (to cover all jobs) or within the specific job that needs it. The best location is the top of the file, after the name and beforeon:, or just afteron:and beforejobs:.Implementation Steps:
.github/workflows/publish.yml(after thename:and beforeon:or directly afteron:):https://github.com/github/custom-element-boilerplate/security/code-scanning/1
The best way to fix the issue is to add a
permissionsblock to the workflow or the specific job(s) within the workflow. Since the job appears to only be building and testing code (checkout and setup-node, then npm commands), it does not require write access to repository resources, so settingcontents: readat the job level is sufficient and aligns with GitHub's recommended minimum. This can be done by adding apermissions:block under thebuild:job, aboveruns-on: macos-latest.No new methods or imports are required; this is a YAML structural edit.
Suggested fixes powered by Copilot Autofix. Review carefully before merging.