Potential fix for code scanning alert no. 1: Workflow does not contain permissions#10
Merged
Potential fix for code scanning alert no. 1: Workflow does not contain permissions#10
Conversation
…n permissions Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
Repository owner
locked and limited conversation to collaborators
Feb 24, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Potential fix for https://github.com/Tanker187/firebase-admin-node/security/code-scanning/1
In general, the fix is to add an explicit
permissions:block that grants only the scopes actually needed by this job. Since the job just checks out the code and runs local Node.js builds and tests, the minimal permissioncontents: readat the workflow or job level is appropriate. This documents the intended privilege and ensures the token stays limited even if repository defaults change or the workflow is copied elsewhere.The single best way to fix this, without changing existing functionality, is to add a job-level
permissions:block underbuild:(the job CodeQL flagged). This keeps the scope of the change tight and clearly associates the permissions with this specific job. Concretely, in.github/workflows/ci.yml, insert:indented to align with
runs-on:andstrategy:within thebuildjob, betweenbuild:andruns-on:(or just aboveruns-on:). No additional imports or definitions are needed, as this is purely a YAML configuration change for GitHub Actions.Suggested fixes powered by Copilot Autofix. Review carefully before merging.