Set workflow token permissions#27
Conversation
|
👋 Hello @glenn-jocher, thank you for submitting a
For more guidance, please refer to our Contributing Guide. Don't hesitate to leave a comment if you have any questions. Thank you for contributing to Ultralytics! 🚀 |
UltralyticsAssistant
left a comment
There was a problem hiding this comment.
🔍 PR Review
Made with ❤️ by Ultralytics Actions
This PR looks clean. Adding top-level permissions: contents: read to both workflows is a sensible least-privilege hardening change, and nothing in the provided diff suggests a functional regression.
|
Merged! 🎉 Thanks for the thoughtful security improvement here, @glenn-jocher. Adding explicit read-only Really appreciate the care and attention to detail on this one 🙌 |
Summary
contents: readpermissions to CI and Replicate push workflowsCodeQL alerts
Addresses:
Validation
yaml.safe_load()git diff --check🛠️ PR Summary
Made with ❤️ by Ultralytics Actions
🌟 Summary
🔐 This PR updates GitHub Actions workflows to use explicit read-only repository permissions, improving CI/CD security without changing functionality.
📊 Key Changes
permissionsblock withcontents: readto.github/workflows/ci.ymlpermissionssetting to.github/workflows/push.yml🎯 Purpose & Impact