Skip to content

Conversation

@mgoudy91
Copy link
Contributor

@mgoudy91 mgoudy91 commented Dec 18, 2025

Purpose

This change addresses GitHub Actions security best practices by explicitly defining permissions for the PR title check workflow. GitHub has been moving towards requiring explicit permissions in workflows to follow the principle of least privilege and prevent potential security issues from overly permissive default token scopes.

Approach

Added a permissions block to the .github/workflows/pr-title-check.yml workflow with minimal required permissions:

  • contents: read - needed to read repository contents
  • pull-requests: read - needed to read PR information for title validation

This follows GitHub's recommended security practices for Actions workflows. The permissions are scoped to the minimum necessary for the workflow to function, which helps prevent potential security vulnerabilities from token misuse.

@mgoudy91 mgoudy91 changed the title fix: add permissions block to pr-title-check workflow fix: add permissions block to pr-title-check workflow [INTEG-3360] / [ACT-2078] Dec 18, 2025
@mgoudy91 mgoudy91 force-pushed the fix/workflow-permissions branch 2 times, most recently from f604b65 to 60a8c1d Compare January 7, 2026 21:12
@mgoudy91 mgoudy91 marked this pull request as ready for review January 7, 2026 21:15
@mgoudy91 mgoudy91 requested a review from a team as a code owner January 7, 2026 21:15
@mgoudy91 mgoudy91 force-pushed the fix/workflow-permissions branch from d8cacad to 4170a69 Compare January 7, 2026 21:17
@mgoudy91 mgoudy91 enabled auto-merge (squash) January 7, 2026 21:19
@mgoudy91 mgoudy91 merged commit 1def44d into master Jan 7, 2026
14 checks passed
@mgoudy91 mgoudy91 deleted the fix/workflow-permissions branch January 7, 2026 21:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants