Skip to main content
Sign in
Snippets Groups Projects
Select Git revision
  • 341ed3b311ad04c17874f6b1d302138a95267b01
  • experimental default protected
  • v2023.2.5-ffs
  • nrb/ex400-remove-wps
  • nrb/airmax-test
  • v2023.2.4-ffs
  • nrb/ar9344-reset-sequence
  • autinerd/experimental-openwrt-24.10
  • v2023.2.3-ffs
  • v2023.2.2-ffs
  • v2023.2-ffs
  • v2023.1-ffs
  • v2022.1.4-ffs
  • feature/addMikrotikwAP
  • v2022.1.3-ffs
  • v2021.1.2-ffs
  • v2022.1.1-ffs
  • master protected
  • v2021.1.1-ffs
  • nrb/gluon-master-cpe510
  • v2021.1-ffs
  • experimental-2025-10-23
  • experimental-2025-10-23-base
  • experimental-2025-10-22
  • experimental-2025-10-22-base
  • experimental-2025-10-19
  • experimental-2025-10-19-base
  • experimental-2025-10-15
  • experimental-2025-10-15-base
  • experimental-2025-10-12
  • experimental-2025-10-12-base
  • experimental-2025-10-06
  • experimental-2025-10-06-base
  • experimental-2025-10-02
  • experimental-2025-10-02-base
  • experimental-2025-09-19
  • experimental-2025-09-19-base
  • experimental-2025-09-15
  • experimental-2025-09-15-base
  • experimental-2025-09-12
  • experimental-2025-09-12-base
41 results

gluon

user avatar
naveen authored
 Restrict the GitHub token permissions only to the required ones; this way, even if the attackers will succeed in compromising your workflow, they won’t be able to do much.

- Included permissions for the action. https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions

https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions

https://docs.github.com/en/actions/using-jobs/assigning-permissions-to-jobs

[Keeping your GitHub Actions and workflows secure Part 1: Preventing pwn requests](https://securitylab.github.com/research/github-actions-preventing-pwn-requests/

)

Signed-off-by: default avatarnaveen <172697+naveensrinivasan@users.noreply.github.com>
341ed3b3
History
Name Last commit Last update