On Thu, 1 Sep 2022 20:37:27 GMT, Alex <d...@openjdk.org> wrote:

> This PR adds explicit [permissions 
> section](https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions)
>  to workflows. This is a security best practice because by default workflows 
> run with [extended set of 
> permissions](https://docs.github.com/en/actions/security-guides/automatic-token-authentication#permissions-for-the-github_token)
>  (except from `on: pull_request` [from external 
> forks](https://securitylab.github.com/research/github-actions-preventing-pwn-requests/)).
>  By specifying any permission explicitly all others are set to none. By using 
> the principle of least privilege the damage a compromised workflow can do 
> (because of an 
> [injection](https://securitylab.github.com/research/github-actions-untrusted-input/)
>  or compromised third party tool or action) is restricted.
> It is recommended to have [most strict permissions on the top 
> level](https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions)
>  and grant write permissions on [job 
> level](https://docs.github.com/en/actions/using-jobs/assigning-permissions-to-jobs)
>  case by case.

This pull request has now been integrated.

Changeset: a27840e8
Author:    sashashura <93376818+sashash...@users.noreply.github.com>
Committer: Kevin Rushforth <k...@openjdk.org>
URL:       
https://git.openjdk.org/jfx/commit/a27840e8fd7e79b1692488e4de7f6f5fdb930cf4
Stats:     3 lines in 1 file changed: 3 ins; 0 del; 0 mod

8293368: GitHub Workflows security hardening

Reviewed-by: kcr, arapte

-------------

PR: https://git.openjdk.org/jfx/pull/889

Reply via email to