-
Notifications
You must be signed in to change notification settings - Fork 0
Closed
Labels
bugSomething isn't workingSomething isn't working
Description
Context
Between PRs #64, #65, #72, and #76, we made multiple changes to workflow permissions and repo settings while debugging agent activation. Some of these were wrong, some were workarounds. We need a thorough audit to understand our current security posture and close any gaps.
Items to Audit
Workflow Permissions
-
roles: allin review-responder.md and quality-gate.md — any actor can trigger these agents (workaround for gh-aw#21098, tracked in tracking: gh-aw bot allowlist bug (github/gh-aw#21098) #74) -
bots: [Copilot, copilot-pull-request-reviewer]— are both needed? Is the list correct? -
permissions:blocks in all 6 workflow .md files — are they least-privilege? - Do any lock files have stale/incorrect permissions from previous bad compiles?
Repo Settings (changed during debugging)
- Fork PR approval: "Require approval for first-time contributors who are new to GitHub" — is this the right level?
- "Allow GitHub Actions to create and approve pull requests" — enabled for quality-gate approvals. Security implications?
- Branch protection: 1 required approval (changed from 2). Should it go back to 2?
- enforce_admins: we toggle this for admin merges. Is the re-enable reliable?
Residual from Bad PRs
- PR fix: allow Copilot reviewer bot to trigger review-responder and quality-gate #64 added
roles: all+ top-levelbots:— PR fix: correct bots: placement under on: for agent activation #65 reverted, but verify nothing lingered - PR fix: add Copilot actor to bots list for agent activation #72 added
Copilotto bots list — harmless but verify it doesn't widen access unexpectedly - Any workflow changes that compiled but produced unexpected lock file output
Agent Capabilities
- review-responder: what permissions does the agent actually use at runtime?
- quality-gate: can it approve PRs? What prevents unauthorized approvals?
- implementer: has
python-packagesnetwork access — is this scoped correctly? - ci-fixer: what can it modify?
When
After the pipeline is confirmed working end-to-end. This is a post-launch hardening task.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
bugSomething isn't workingSomething isn't working