Appearance
SEC539 / MD-GH-REPO-EDIT-ALLOWED-TOOLS
SEC539 flags AI-native markdown frontmatter when allowed-tools grants blanket gh repo edit authority.
Why It Matters
gh repo edit can mutate repository settings. In shared AI-native markdown guidance that is broader than most teams want to advertise as default agent authority.
Trigger Shape
- the file is an AI-native markdown surface
- the path is not fixture-like
- frontmatter
allowed-toolsorallowed_toolscontains the exact tokenBash(gh repo edit:*)
Clean Cases
- narrower read-only grants such as
Bash(gh repo view:*) - markdown surfaces without blanket repository edit grants
- fixture-like examples under test or fixture paths
Example Trigger
yaml
---
allowed-tools:
- Bash(gh repo edit:*)
---Safer Example
yaml
---
allowed-tools:
- Bash(gh repo view:*)
---How To Fix
Remove shared gh repo edit tool grants or replace them with narrower reviewed commands that keep repository settings mutation under explicit user control.