Skip to content

Conversation

@null-nick
Copy link
Collaborator

Potential fix for https://github.com/PyrogramMod/PyrogramMod/security/code-scanning/7

To fix the problem, add a permissions block to the workflow file .github/workflows/python.yml. The most general and minimal way to do this is to specify the permissions key at the top-level (just below the workflow name, typically), or at the job level if customized per job is desired. Since the workflow does not show any steps that require write permission (e.g., it doesn't push code, create releases, or modify pull requests), it's safe to set contents: read, which is the recommended minimal permission for workflows that only need to read repository contents. Insert permissions: contents: read immediately after the name field (before on:) or above jobs:.

Suggested fixes powered by Copilot Autofix. Review carefully before merging.

Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
@null-nick null-nick changed the title Potential fix for code scanning alert no. 7: Workflow does not contain permissions Fixes: CodeQL Oct 11, 2025
@null-nick null-nick marked this pull request as ready for review October 11, 2025 14:29
@null-nick null-nick closed this Oct 11, 2025
@null-nick
Copy link
Collaborator Author

closed as completed

@null-nick null-nick deleted the fixes/codeql branch October 11, 2025 19:39
@PyrogramMod PyrogramMod locked as resolved and limited conversation to collaborators Oct 11, 2025
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants