Skip to content
OnMSFT.com
  • Home
  • About
  • Contact
  • Windows
  • Surface
  • Xbox
  • How-To
  • OnPodcast
  • Edge
  • Teams
  • Gaming
Menu
  • Home
  • About
  • Contact
  • Windows
  • Surface
  • Xbox
  • How-To
  • OnPodcast
  • Edge
  • Teams
  • Gaming
  1. Home
  2. News
  3. GitHub launches actions-permissions: a tool to strengthen security for GitHub Actions

GitHub launches actions-permissions: a tool to strengthen security for GitHub Actions

Pranav Bhardwaj Pranav Bhardwaj
June 27, 2023
2 min read

GitHub, the leading platform for software development collaboration, has unveiled the latest tool called actions-permissions. This tool is specifically designed to address the need for better security and control over the repository token used in GitHub Actions workflows.

GitHub Actions, which allow users to automate various tasks and workflows within their repositories, utilize a temporary repository access token known as GITHUB_TOKEN. In the past, these tokens possessed wide-ranging permissions, granting full read and write access to the repository, with only pull requests from forks being an exception. However, GitHub implemented a more fine-grained permission model for workflow tokens in 2021. As part of this change, the default permissions for new repositories and organizations were set to read-only, providing a more secure starting point.

Despite these advancements, a significant number of workflows still rely on a write-all token due to default workflow permission settings. In many cases, write permissions are not actually necessary. To help users identify if their workflows are using overly broad default permissions, GitHub provides a simple way to check the “Workflow permissions” section in the repository or organization settings.

While switching to a read-only permission setting is considered a security best practice, doing so may inadvertently disrupt existing workflows that rely on write-all permissions. Another challenge arises when applying the principle of least privilege, as complex workflows often involve multiple actions, making it easy to overlook specific permission required for proper workflow execution. Additionally, the diverse steps and error-handling mechanisms present in workflows can make it difficult to determine the precise set of privileges needed for more intricate workflow definitions.

To assist users in transitioning to a more secure workflow permission model, GitHub has introduced a set of powerful tools called actions-permissions. These tools provide monitoring and recommendation features that simplify the process of identifying and assigning the minimum required permissions for a given workflow.

The Monitor action, one of the key components of actions-permissions, installs a local proxy within the workflow runner. It actively collects information about any interactions with the GitHub API initiated by the workflow, allowing users to review and understand the minimum permissions needed. The recommendations are conveniently presented as part of the workflow run summary, providing clear insights into the required permissions.

In addition to the Monitor action, GitHub offers the Advisor action, which functions as both a local tool and a way to summarize the recommendations from multiple workflow runs. This feature provides users with a comprehensive overview of the permissions required across various iterations of their workflows.

Once users have implemented the recommended permissions in their workflows, they can discontinue the use of these tools. If any additional permissions become necessary for future iterations, users can easily add them as required.

GitHub welcomes users to try out these tools and provide valuable feedback, contributing to the ongoing improvement of GitHub’s offerings. With actions-permissions, GitHub continues to demonstrate its commitment to providing a safe and efficient environment for developers and organizations worldwide.

Related

Share this article:
Previous Article GitHub launches actions-permissions: a tool to strengthen security for GitHub Actions Next Article Microsoft’s training Small Language Models to outperform ChatGPT

Related Articles

Watching YouTube in Edge? Copilot may suggest what to watch next

March 21, 2026
Denis Dyack calls NVIDIA DLSS 5 a mistake, warns it changes game art direction and could harm AAA game development future.

DLSS 5 “Needs to Go Back to the Drawing Board,” Eternal Darkness Dev Says

March 21, 2026

Crimson Desert players spot possible AI-generated art after launch

March 21, 2026

Leave a Comment Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Watching YouTube in Edge? Copilot may suggest what to watch next
  • DLSS 5 “Needs to Go Back to the Drawing Board,” Eternal Darkness Dev Says
  • Crimson Desert players spot possible AI-generated art after launch
  • Chrome is adding a scanning animation and ‘Checking download for safety’ message for risky downloads
  • Microsoft says Windows 11 will get faster, quieter, and more customizable

Recent Comments

No comments to show.
OnMSFT.com

The Tech News Site

Categories

  • Windows
  • Surface
  • Xbox
  • How-To
  • OnPodcast
  • Gaming
  • Edge
  • Teams

Recent Posts

  • Watching YouTube in Edge? Copilot may suggest what to watch next
  • DLSS 5 “Needs to Go Back to the Drawing Board,” Eternal Darkness Dev Says
  • Crimson Desert players spot possible AI-generated art after launch
  • Chrome is adding a scanning animation and 'Checking download for safety' message for risky downloads
  • Microsoft says Windows 11 will get faster, quieter, and more customizable

Quick Links

  • About OnMSFT.com
  • Contact OnMSFT
  • Join Our Team
  • Privacy Policy
© 2010–2026 OnMSFT.com LLC. All rights reserved.
About OnMSFT.comContact OnMSFTPrivacy Policy