Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
56 changes: 28 additions & 28 deletions .github/workflows/ai-moderator.lock.yml

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

1 change: 1 addition & 0 deletions .github/workflows/ai-moderator.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,6 +33,7 @@ tools:
mode: local
read-only: true
toolsets: [default]
min-integrity: none
Copy link

Copilot AI Apr 7, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Setting min-integrity: none without also constraining allowed-repos causes the compiled guard policy to default to repos: "all" (see ai-moderator.lock.yml guard-policies block), which can unintentionally grant the workflow’s GitHub MCP access to all repositories reachable by the token (including if GH_AW_GITHUB_TOKEN is a broad PAT). If this workflow only needs to moderate activity in the current repo, explicitly set allowed-repos to the current repository (or a narrow pattern) alongside min-integrity: none to keep cross-repo access minimized.

Suggested change
min-integrity: none
min-integrity: none
allowed-repos:
- ${{ github.repository }}

Copilot uses AI. Check for mistakes.
permissions:
contents: read
issues: read
Expand Down