Skip to content

Commit 90feb43

Browse files
tashianclaude
andcommitted
Restrict permissions on zizmor and frizbee caller jobs
Add explicit `permissions: contents: read` to the zizmor and frizbee job calls in ci.yml and goCI.yml to resolve zizmor's "overly broad permissions" warnings. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
1 parent 72bdcca commit 90feb43

2 files changed

Lines changed: 8 additions & 0 deletions

File tree

.github/workflows/ci.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,10 +22,14 @@ jobs:
2222

2323
zizmor:
2424
name: Scan GitHub workflows
25+
permissions:
26+
contents: read
2527
uses: ./.github/workflows/zizmor.yml
2628

2729
frizbee:
2830
name: Check action pinning
31+
permissions:
32+
contents: read
2933
uses: ./.github/workflows/frizbee.yml
3034

3135
lint-dummy-app: # NOTE(@azazeal): this check is here to verify that .golangci.yml is valid

.github/workflows/goCI.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -146,9 +146,13 @@ jobs:
146146
CODECOV_TOKEN: ${{ secrets.CODECOV_TOKEN }}
147147

148148
zizmor:
149+
permissions:
150+
contents: read
149151
uses: ./.github/workflows/zizmor.yml
150152

151153
frizbee:
154+
permissions:
155+
contents: read
152156
uses: ./.github/workflows/frizbee.yml
153157

154158
build:

0 commit comments

Comments
 (0)