Appearance
Why It Matters
permissions: write-all grants the workflow a very broad token surface by default. That weakens least privilege and increases the blast radius of any compromised step or third-party action.
What Triggers
SEC327 applies to semantically confirmed GitHub Actions workflow YAML and triggers when the workflow sets:
yaml
permissions: write-allExample that stays clean:
yaml
permissions:
contents: readFalse Positives
This is a structural least-privilege rule rather than a claim that the workflow is already exploited. Teams may intentionally allow broad write scopes, but the finding remains useful because write-all is an explicit shortcut away from reviewable minimal permissions.
Remediation
Replace write-all with the minimal explicit permissions the workflow actually needs.