Appearance
SEC511 / MD-GH-SECRET-SET-ALLOWED-TOOLS
SEC511 flags AI-native markdown frontmatter when allowed-tools grants blanket gh secret set mutation authority.
Why It Matters
gh secret set can write or overwrite GitHub secrets. In shared AI-native markdown guidance that is broader than most teams want to advertise as default agent authority.
Trigger Shape
The rule triggers only when all of these are true:
- the file is an AI-native markdown surface
- the path is not fixture-like
- frontmatter
allowed-toolsorallowed_toolscontains the exact tokenBash(gh secret set:*)
Clean Cases
These stay clean:
- narrower read-only grants such as
Bash(gh secret list:*) - markdown surfaces without blanket secret mutation grants
- fixture-like examples under test or fixture paths
Example Trigger
yaml
---
allowed-tools:
- Bash(gh secret set:*)
---Safer Example
yaml
---
allowed-tools:
- Bash(gh secret list:*)
---How To Fix
Remove shared gh secret set tool grants or replace them with narrower reviewed commands that keep secret mutation under explicit user control.