Potential fix for code scanning alert no. 7: Workflow does not contain permissions #25
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Potential fix for https://github.com/microsoft/merklecpp/security/code-scanning/7
In general, the fix is to add an explicit
permissionsblock declaring the least privileges the workflow needs. For a standard CodeQL analysis workflow that only checks out code and runs analysis, that typically means read access to repository contents (contents: read) and allowing the CodeQL action to upload security analysis results (security-events: write). These permissions can be set at the workflow root (applies to all jobs) or on the individual job.For this specific file
.github/workflows/codeql-analysis.yml, the minimal, non-breaking change is to add apermissionsblock under theanalyzejob (indented to match other job keys likename,runs-on, andstrategy). This keeps the permissions local to this job and avoids affecting any other jobs that might be added later. Insert:between
runs-on: ubuntu-latest(line 15) andstrategy:(line 17). No additional imports or definitions are needed because this is purely a YAML configuration change. Existing behavior of the CodeQL workflow remains the same, while theGITHUB_TOKENis now explicitly restricted to the minimum needed scopes.Suggested fixes powered by Copilot Autofix. Review carefully before merging.