Skip to content

Add github action#30

Merged
thibautbaillet merged 1 commit intomainfrom
github-workflow
Feb 6, 2026
Merged

Add github action#30
thibautbaillet merged 1 commit intomainfrom
github-workflow

Conversation

@thibautbaillet
Copy link
Contributor

No description provided.

@thibautbaillet thibautbaillet requested a review from a team February 6, 2026 15:15
@thibautbaillet thibautbaillet self-assigned this Feb 6, 2026
@wiz-swan
Copy link

wiz-swan bot commented Feb 6, 2026

Wiz Scan Summary

Scanner Findings
Vulnerability Finding Vulnerabilities -
Data Finding Sensitive Data -
Secret Finding Secrets -
IaC Misconfiguration IaC Misconfigurations 4 Info
SAST Finding SAST Findings -
Software Management Finding Software Management Findings -
Total 4 Info

View scan details in Wiz

To detect these findings earlier in the dev lifecycle, try using Wiz Code VS Code Extension.

permissions:
id-token: write # Required for OIDC (used for npm publish with Trusted publishing)
packages: write
contents: write
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Info IaC Finding

Workflow should not have write permissions to sensitive scopes
on resource jobs.build.permissions.contents

More Details
This rule checks that GitHub workflow does not use unnecessarily elevated token permissions. This rule fails when a workflow grants write permissions to sensitive scopes like `contents`, `pull-requests`, `packages`, or other privileged operations. Excessive token permissions increase the potential impact of a workflow compromise, allowing attackers to modify repository contents, merge pull requests, or perform other damaging actions. To prevent this risk, always apply the principle of least privilege by restricting token permissions to only what's absolutely necessary for each workflow.

Expected

Job 'build' should not have write permission for 'contents'

Found

Job 'build' has write permission for sensitive scope 'contents'

Security Frameworks: wf-id-1, wf-id-175


Rule ID: 88a7f807-7b08-451e-a9b2-7cd83e3a21a3

runs-on: ubuntu-latest

permissions:
id-token: write # Required for OIDC (used for npm publish with Trusted publishing)
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Info IaC Finding

Workflow should not have write permissions to sensitive scopes
on resource jobs.build.permissions.id-token

More Details
This rule checks that GitHub workflow does not use unnecessarily elevated token permissions. This rule fails when a workflow grants write permissions to sensitive scopes like `contents`, `pull-requests`, `packages`, or other privileged operations. Excessive token permissions increase the potential impact of a workflow compromise, allowing attackers to modify repository contents, merge pull requests, or perform other damaging actions. To prevent this risk, always apply the principle of least privilege by restricting token permissions to only what's absolutely necessary for each workflow.

Expected

Job 'build' should not have write permission for 'id-token'

Found

Job 'build' has write permission for sensitive scope 'id-token'

Security Frameworks: wf-id-1, wf-id-175


Rule ID: 88a7f807-7b08-451e-a9b2-7cd83e3a21a3


permissions:
id-token: write # Required for OIDC (used for npm publish with Trusted publishing)
packages: write
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Info IaC Finding

Workflow should not have write permissions to sensitive scopes
on resource jobs.build.permissions.packages

More Details
This rule checks that GitHub workflow does not use unnecessarily elevated token permissions. This rule fails when a workflow grants write permissions to sensitive scopes like `contents`, `pull-requests`, `packages`, or other privileged operations. Excessive token permissions increase the potential impact of a workflow compromise, allowing attackers to modify repository contents, merge pull requests, or perform other damaging actions. To prevent this risk, always apply the principle of least privilege by restricting token permissions to only what's absolutely necessary for each workflow.

Expected

Job 'build' should not have write permission for 'packages'

Found

Job 'build' has write permission for sensitive scope 'packages'

Security Frameworks: wf-id-1, wf-id-175


Rule ID: 88a7f807-7b08-451e-a9b2-7cd83e3a21a3

# This workflow will do a clean install of node dependencies, build the source code and run tests across different versions of node
# For more information see: https://help.github.com/actions/language-and-framework-guides/using-nodejs-with-github-actions

name: Release
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Info IaC Finding

Workflow should have permissions limitations
on resource name

More Details
This rule checks that GitHub workflow has an empty permissions block to enforce least privilege. This rule fails when the workflow doesn't have a permissions block or has a non-empty permissions block with `write-all` scope, which can grant excessive permissions to workflow actions. Excessive permissions in GitHub workflows increase the risk surface in case of a compromise, potentially allowing attackers to access sensitive resources or perform unauthorized actions. To prevent this risk, always implement least privilege by explicitly defining an empty permissions block for all workflows.

Expected

GitHub workflow should have empty permissions block

Found

GitHub workflow doesn't have a permissions block defined

Security Frameworks: wf-id-175, wf-id-1


Rule ID: f140b9ff-063f-4312-ad25-dca7d00fb913

@thibautbaillet thibautbaillet merged commit e210f0a into main Feb 6, 2026
6 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant