[SECURITY] Harden GitHub Workflows#512
Merged
John McCall (lowlydba) merged 1 commit intomainfrom Apr 9, 2026
Merged
Conversation
Add a 7-day default cooldown to Dependabot to reduce frequent dependency PRs. Update GitHub Actions workflow for building/deploying manifests: move repo permissions into the deploy job, set explicit job-level permissions (pages, id-token, contents), give the job a name, disable persist-credentials for checkout, and pin several Actions to specific versions/commits (checkout, setup-python, configure-pages, upload-pages-artifact, deploy-pages) for reproducible and secure deployments to GitHub Pages. Signed-off-by: John McCall <john@overturemaps.org>
|
You are seeing this message because GitHub Code Scanning has recently been set up for this repository, or this pull request contains the workflow file for the Code Scanning tool. What Enabling Code Scanning Means:
For more information about GitHub Code Scanning, check out the documentation. |
There was a problem hiding this comment.
Pull request overview
This PR hardens the repo’s GitHub automation configuration to address zizmor security findings and prepare for enforcement via OMF Security Checks.
Changes:
- Pins GitHub Actions used in the Pages workflow to full commit SHAs and disables persisted checkout credentials.
- Tightens
GITHUB_TOKENpermissions by defaulting tocontents: readat workflow scope and granting elevated permissions only on the deploy job. - Adds a Dependabot cooldown window to reduce update churn.
Reviewed changes
Copilot reviewed 2 out of 2 changed files in this pull request and generated no comments.
| File | Description |
|---|---|
| .github/workflows/build-manifests.yml | Pins actions to SHAs, scopes permissions to the deploy job, and disables persisted credentials for checkout. |
| .github/dependabot.yml | Adds a cooldown period for Dependabot updates. |
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
Alex Iannicelli (atiannicelli)
approved these changes
Apr 9, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Clears zizmor flagged security issues. After this PR, we'll use OMF Security Checks to enforce these settings going forward.