Skip to content

Maintenance: Address code scanning alerts about GitHub Actions token permissions #2371

@phipag

Description

@phipag

Summary

We need to refine our GitHub actions token permissions since they lead to CodeQL alerts (https://github.com/aws-powertools/powertools-lambda-java/security/code-scanning).

Example:

Token-Permissions
score is 9: jobLevel 'contents' permission set to 'write'
Remediation tip: Visit https://app.stepsecurity.io/secureworkflow.
Tick the 'Restrict permissions for GITHUB_TOKEN'
Untick other options
NOTE: If you want to resolve multiple issues at once, you can visit https://app.stepsecurity.io/securerepo instead.
Click Remediation section below for further remediation help
Scorecard

Why is this needed?

This is needed to ensure least-privilege token use and scope down the permissions of our CI/CD pipeline to only the needed permissions.

Which area does this relate to?

Governance

Solution

No response

Acknowledgment

Metadata

Metadata

Assignees

Type

No type
No fields configured for issues without a type.

Projects

Status

Backlog

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions