Skip to content

Dev#9

Merged
Szotkowski merged 8 commits intomainfrom
dev
Feb 4, 2026
Merged

Dev#9
Szotkowski merged 8 commits intomainfrom
dev

Conversation

@Szotkowski
Copy link
Member

Pull Request

Description

Please describe what this PR does and why.

Related Issues

Closes #

Checklist

  • Tests added
  • Docs updated
  • Follows contribution guidelines

Thank you for contributing to Selecro! 🧶

Szotkowski and others added 8 commits August 28, 2025 14:32
# Pull Request

## Description

Please describe what this PR does and why.

## Related Issues

Closes #<issue-number>

## Checklist

- [ ] Tests added
- [ ] Docs updated
- [ ] Follows contribution guidelines

Thank you for contributing to **Selecro**! 🧶

---------

Signed-off-by: Michael Szotkowski <mikiszotkowski@protonmail.com>
Signed-off-by: Michael Szotkowski <mikiszotkowski@protonmail.com>
# Pull Request

## Description

Please describe what this PR does and why.

## Related Issues

Closes #<issue-number>

## Checklist

- [ ] Tests added
- [ ] Docs updated
- [ ] Follows contribution guidelines

Thank you for contributing to **Selecro**! 🧶

Signed-off-by: Michael Szotkowski <mikiszotkowski@protonmail.com>
# Pull Request

## Description

Please describe what this PR does and why.

## Related Issues

Closes #<issue-number>

## Checklist

- [ ] Tests added
- [ ] Docs updated
- [ ] Follows contribution guidelines

Thank you for contributing to **Selecro**! 🧶
Signed-off-by: Michael Szotkowski <mikiszotkowski@protonmail.com>
…n permissions (#8)

Potential fix for
[https://github.com/Selecro/.github/security/code-scanning/1](https://github.com/Selecro/.github/security/code-scanning/1)

In general, fix this by adding an explicit `permissions:` block to the
workflow (or to the specific job) that grants only the minimal required
scopes. For this branch-name check, no API access is needed: it just
inspects environment variables. The safest, least-privilege
configuration is to disable all default token permissions with
`permissions: {}` at the job (or workflow) level.

Concretely, in `.github/workflows/branch-name-check.yml`, add a
`permissions: {}` block under the `check-branch-name` job (indented to
align with `runs-on:`). This tells GitHub Actions to provide a
`GITHUB_TOKEN` with no permissions at all, which preserves existing
behavior of the script while tightening security. No imports or
additional methods are needed, since this is pure YAML configuration.


_Suggested fixes powered by Copilot Autofix. Review carefully before
merging._

---------

Signed-off-by: Michael Szotkowski <mikiszotkowski@protonmail.com>
Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
@Szotkowski Szotkowski merged commit 20be88b into main Feb 4, 2026
3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant