Use read permissions in pull_request_target CI to mitigate vulnerability
This commit is contained in:
parent
bea8bd38f1
commit
a709493273
2
.github/workflows/pull_request.yml
vendored
2
.github/workflows/pull_request.yml
vendored
@ -5,6 +5,8 @@ on:
|
|||||||
paths-ignore:
|
paths-ignore:
|
||||||
- 'docs/**'
|
- 'docs/**'
|
||||||
|
|
||||||
|
permissions: read-all
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
server_tests:
|
server_tests:
|
||||||
strategy:
|
strategy:
|
||||||
|
Loading…
Reference in New Issue
Block a user