-
Notifications
You must be signed in to change notification settings - Fork 47
Enhance release workflow security for pull request triggers #401
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Co-authored-by: gcatanese <[email protected]>
|
@copilot I don't like the approach: revert all changes and implement the following: |
Could you please clarify what approach you'd like me to implement? The comment mentions "implement the following:" but doesn't specify the alternative solution. Should I keep the pull_request trigger but implement a different security approach, or did you have a specific implementation in mind? |
|
@copilot I don't like the approach: revert all changes and implement the following:
|
…uests write permission Co-authored-by: gcatanese <[email protected]>
Implemented in commit 21215c4:
Regarding
Setting it to Warning Firewall rules blocked me from connecting to one or more addresses (expand for details)I tried to connect to the following addresses, but was blocked by firewall rules:
If you need me to access, download, or install something from one of these locations, you can either:
|
Co-authored-by: gcatanese <[email protected]>
|
|
Superseded by #404 |



The
release.ymlworkflow was triggered onpull_requestevents with high-privilege permissions (contents: write,pull-requests: write) and access toADYEN_AUTOMATION_BOT_ACCESS_TOKEN. While a conditional check prevented fork PRs, this pattern creates unnecessary risk if the check were misconfigured or bypassed.Changes
github.event.pull_request.merged == trueconditionpull-requests: writepermission - Reduced permission scope to minimize security riskpull_requesttrigger - Kept PR trigger with stricter security controls for automated releases on mergeSecurity Improvements
pull-requests: writecontents: writepermission is retained as it's required for the release-automation-action to commit version updates and create tagsThis approach maintains automated release functionality while significantly reducing the attack surface through stricter conditional checks and minimal permissions.
Original prompt
💡 You can make Copilot smarter by setting up custom instructions, customizing its development environment and configuring Model Context Protocol (MCP) servers. Learn more Copilot coding agent tips in the docs.