Skip to content

audit: review permissions and security gaps from activation fix churn #77

@microsasa

Description

@microsasa

Context

Between PRs #64, #65, #72, and #76, we made multiple changes to workflow permissions and repo settings while debugging agent activation. Some of these were wrong, some were workarounds. We need a thorough audit to understand our current security posture and close any gaps.

Items to Audit

Workflow Permissions

  • roles: all in review-responder.md and quality-gate.md — any actor can trigger these agents (workaround for gh-aw#21098, tracked in tracking: gh-aw bot allowlist bug (github/gh-aw#21098) #74)
  • bots: [Copilot, copilot-pull-request-reviewer] — are both needed? Is the list correct?
  • permissions: blocks in all 6 workflow .md files — are they least-privilege?
  • Do any lock files have stale/incorrect permissions from previous bad compiles?

Repo Settings (changed during debugging)

  • Fork PR approval: "Require approval for first-time contributors who are new to GitHub" — is this the right level?
  • "Allow GitHub Actions to create and approve pull requests" — enabled for quality-gate approvals. Security implications?
  • Branch protection: 1 required approval (changed from 2). Should it go back to 2?
  • enforce_admins: we toggle this for admin merges. Is the re-enable reliable?

Residual from Bad PRs

Agent Capabilities

  • review-responder: what permissions does the agent actually use at runtime?
  • quality-gate: can it approve PRs? What prevents unauthorized approvals?
  • implementer: has python-packages network access — is this scoped correctly?
  • ci-fixer: what can it modify?

When

After the pipeline is confirmed working end-to-end. This is a post-launch hardening task.

Metadata

Metadata

Assignees

No one assigned

    Labels

    bugSomething isn't working

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions