Skip to content

Conversation

@phipag
Copy link
Contributor

@phipag phipag commented Jan 27, 2026

Summary

This PR addresses 6 open code scanning alerts related to overly permissive GitHub Actions token permissions, following the principle of least privilege (https://github.com/aws-powertools/powertools-lambda-java/security/code-scanning).

Changes

Applies the "deny by default, allow explicitly" pattern across workflow files:

  • Set permissions: {} at workflow level to disable all permissions by default
  • Declare only minimum required permissions at each job level
  • Added inline comments explaining why each permission is needed

Issue number: #2371


By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.

Disclaimer: We value your time and bandwidth. As such, any pull requests created on non-triaged issues might not be successful.

@sonarqubecloud
Copy link

@phipag phipag linked an issue Jan 27, 2026 that may be closed by this pull request
2 tasks
@github-actions
Copy link
Contributor

Dependency Review Summary

The full dependency review summary is too large to display here. Please download the artifact named "dependency-review-summary" to view the complete report.

View full job summary

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

Status: No status

Development

Successfully merging this pull request may close these issues.

Maintenance: Address code scanning alerts about GitHub Actions token permissions

1 participant