Potential fix for code scanning alert no. 2: Workflow does not contain permissions #15
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Potential fix for https://github.com/CogStack/ocr-service/security/code-scanning/2
To fix the problem, explicitly restrict the
GITHUB_TOKENpermissions for this workflow. Since the job only needs to read repository contents (foractions/checkout), we can safely setcontents: readat the workflow root. This will apply to all jobs (there is only one job,build) unless they override it.Concretely:
.github/workflows/run_tests.yml.permissions:block near the top, alongsidename:andon:.contents: readas a minimal, least-privilege permission. No steps in the current snippet indicate a need for write or other scopes.Placement:
permissionsblock after thename: tests-ocr-serviceline and before theon:block, to make it clear that it applies to the whole workflow.No additional methods, imports, or definitions are needed; this is purely a YAML configuration change.
Suggested fixes powered by Copilot Autofix. Review carefully before merging.