Skip to content

fix: tighten workflow permissions, add security hardening, and fix uv tool invocations#358

Merged
jmeridth merged 2 commits intomainfrom
fix/security-hardening-and-uv-invocations
Mar 14, 2026
Merged

fix: tighten workflow permissions, add security hardening, and fix uv tool invocations#358
jmeridth merged 2 commits intomainfrom
fix/security-hardening-and-uv-invocations

Conversation

@jmeridth
Copy link
Collaborator

What

Move elevated permissions from workflow level to job level for mark-ready-when-ready and scorecard workflows so each job only holds the permissions it actually needs. Add step-security/harden-runner to all eight workflows that define steps. Add CodeQL SAST scanning and dependency-review workflows. Add pre-commit configuration with gitleaks, formatting hooks, and local linter hooks. Fix Makefile to invoke flake8, pytest, pylint, and mypy via uv run python -m since they lack console script entry points in the uv venv. Upgrade PyJWT from 2.11.0 to 2.12.1 to address CVE-2026-32597.

Why

Workflow-level write permissions apply to every job in the workflow, granting broader access than necessary. Moving them to job level follows the principle of least privilege. Harden-runner audits outbound network calls from GitHub-hosted runners, improving supply-chain visibility. CodeQL and dependency-review close gaps in static analysis and vulnerable-dependency detection. The Makefile commands failed under uv because those packages don't install console scripts; python -m ensures the tools are always found. PyJWT <= 2.11.0 doesn't validate the RFC 7515 crit header parameter (CVSS 7.5).

Notes

  • The uv run to uv run python -m change also affects CI since python-ci calls make lint and make test
  • release.yml, auto-labeler.yml, and pr-title.yml use reusable workflows at the job level so harden-runner cannot be added there; it must go in the reusable workflow definitions instead
  • The scorecard workflow previously used permissions: read-all which granted read access to all scopes; now explicitly scoped to only what's needed
  • PyJWT is a transitive dependency; verify downstream consumers aren't relying on the old crit-header-ignored behavior
  • Mirrors changes from fix: tighten workflow permissions, add security hardening, and fix uv tool invocations issue-metrics#702

@jmeridth jmeridth requested a review from zkoppert as a code owner March 14, 2026 02:11
@github-actions github-actions bot added the fix label Mar 14, 2026
… tool invocations

## What

Move elevated permissions from workflow level to job level for mark-ready-when-ready and
scorecard workflows so each job only holds the permissions it actually needs. Add
step-security/harden-runner to all eight workflows that define steps. Add CodeQL SAST
scanning and dependency-review workflows. Add pre-commit configuration with gitleaks,
formatting hooks, and local linter hooks. Fix Makefile to invoke flake8, pytest, pylint,
and mypy via `uv run python -m` since they lack console script entry points in the uv
venv. Upgrade PyJWT from 2.11.0 to 2.12.1 to address CVE-2026-32597.

## Why

Workflow-level write permissions apply to every job in the workflow, granting broader
access than necessary. Moving them to job level follows the principle of least privilege.
Harden-runner audits outbound network calls from GitHub-hosted runners, improving
supply-chain visibility. CodeQL and dependency-review close gaps in static analysis and
vulnerable-dependency detection. The Makefile commands failed under uv because those
packages don't install console scripts; `python -m` ensures the tools are always found.
PyJWT <= 2.11.0 doesn't validate the RFC 7515 `crit` header parameter (CVSS 7.5).

## Notes

- The `uv run` to `uv run python -m` change also affects CI since python-ci calls `make lint` and `make test`
- release.yml, auto-labeler.yml, and pr-title.yml use reusable workflows at the job level so harden-runner cannot be added there
- The scorecard workflow previously used `permissions: read-all` which granted read access to all scopes; now explicitly scoped to only what's needed
- PyJWT is a transitive dependency; verify downstream consumers aren't relying on the old crit-header-ignored behavior

Signed-off-by: jmeridth <jmeridth@gmail.com>
@jmeridth jmeridth force-pushed the fix/security-hardening-and-uv-invocations branch from 10b4bb1 to e811c31 Compare March 14, 2026 02:28
@zkoppert
Copy link
Collaborator

The Autobuild step in codeql.yml is a no-op for Python since CodeQL analyzes source directly without a build step. Please remove the Autobuild step and its surrounding comments to keep the workflow clean.

Signed-off-by: jmeridth <jmeridth@gmail.com>
Copy link
Collaborator

@zkoppert zkoppert left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM - minor note: consider removing the Autobuild step from codeql.yml since it's a no-op for Python.

@jmeridth jmeridth merged commit 4611605 into main Mar 14, 2026
36 checks passed
@jmeridth jmeridth deleted the fix/security-hardening-and-uv-invocations branch March 14, 2026 04:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants