CARVIEW |
Navigation Menu
Replies: 15 comments · 4 replies
-
every CI provider has this problem as well -- using a CI provider on any repo requires giving them access to everything. specifically bad problem for people who are in multiple organizations or who have a mix of public + private repos circleci has a docs page about it:
more granular scope would make it safer to use all kinds of codebase plugins another approach would be to create a 'scoped subset' of my account that has access only to certain repos or organizations -- then the plugin vendor wouldn't have to worry about permissions at the moment, is the best practice to create a whole new github account? |
Beta Was this translation helpful? Give feedback.
All reactions
-
@github-staff this discussion + a good amount of StackOverflow posts reference this issue all the way back to 2015-2016. Can you at least give a corporate-friendly answer to why more read-only scopes are not a thing yet? Just repeating what everyone thinks about not having them:
|
Beta Was this translation helpful? Give feedback.
All reactions
-
I can't believe this has been completely ignored for YEARS... |
Beta Was this translation helpful? Give feedback.
All reactions
-
π 4
-
Yeah, I saw a post dating back to 2015 about this. It makes no sense from a security standpoint. |
Beta Was this translation helpful? Give feedback.
All reactions
-
https://github.blog/2022-10-18-introducing-fine-grained-personal-access-tokens-for-github/ π |
Beta Was this translation helpful? Give feedback.
All reactions
-
π 4
-
Oh, what a fine sense of humor the GitHub team has! The above blog entry was published exactly 7 years (on October 18th) after the initial issue jollygoodcode/jollygoodcode.github.io#6 was raised. |
Beta Was this translation helpful? Give feedback.
All reactions
-
π 1
-
This actually is not a good solution for oauth apps. It's not very userfriendy that the user has to create a token and select the right permissions in this huge mess of posibilities. I want to request access with my app with the correct scope preselected. Even after 7 years Microsoft did not understand the use cases that we have. Really disappointing. |
Beta Was this translation helpful? Give feedback.
All reactions
-
π 5
-
@github π π π Please let us know if you plan to fix this crucial issue for App Developers! This limits the use of applications in Github significantly because clients don't want to install apps due to excessive scope! Please give us the ability to request read-only repos in OAuth App Scopes. |
Beta Was this translation helpful? Give feedback.
All reactions
-
Please help |
Beta Was this translation helpful? Give feedback.
All reactions
-
It's crazy how GitHub OAuth still lacks a read-only scope for repos, despite an open issue since 2015. Hopefully, GitHub will prioritize this feature soon, as the fine-grained personal access tokens don't fit all the use cases. |
Beta Was this translation helpful? Give feedback.
All reactions
-
Damn, same problem here, I wasn't expecting this much messages but it reassure me about the fact that I'm in need of this feature (just a simple repo:read would be nice) My company is ok for using a really helpful tool but the scopes necessary to read repositories are too high at the moment and it makes no sense |
Beta Was this translation helpful? Give feedback.
All reactions
-
Hey everyone, So I encountered that problem a few minutes ago as well, but I managed to find a solution!
I just used that and it worked! The number of available scopes is limited but it's a start Hope this helps βοΈ |
Beta Was this translation helpful? Give feedback.
All reactions
-
Hey @frgfm! The problem we're discussing is that there is no read-only scope for a user's public and/or private repositories. The link you provided confirms this issue. Please refer to the original message in the discussion! |
Beta Was this translation helpful? Give feedback.
All reactions
-
My bad, I thought that on top of user-specific scope it was also about more general read-only aspects on other routes. And yes some are provided, some aren't indeed. |
Beta Was this translation helpful? Give feedback.
All reactions
-
From what I have read this discussion has been going on for some time, so not going to hold my breath. But as many others have mentioned, it would be prudent from a security perspective to be able to limit access to read only on private repos for example. It seems a bit heavy handed to grant read/write/all access to apps that just want to read data. Anyone found an explanation as to why this is not and will not be implemented? |
Beta Was this translation helpful? Give feedback.
All reactions
-
π 1
-
There appears to be an option exactly like this for projects:
|
Beta Was this translation helpful? Give feedback.
All reactions
-
π 1
-
Why can't an OAuth login request read-only access to a specific repo, as well? Why does it have to be all private repos? |
Beta Was this translation helpful? Give feedback.
All reactions
-
With the official GitHub MCP server now available, AI tools need secure, least-privilege access to both public and private repos. Today most clients fall back to long-lived PATsβcumbersome to rotate and prone to over-permission. By adopting OAuth 2.1 (PKCE, no implicit flow, fine-grained scopes) in MCP serversβand exposing a read-only scope for cloning/status checksβAI agents could obtain short-lived, read-only tokens via standard flows (see draft: https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1). Managed providers like Composioβs MCP server already support OAuth out-of-the-box, handling token refresh and security best practices. Exposing a read-only OAuth scope will streamline credential management and enforce least-privilege for AI-driven workflows. |
Beta Was this translation helpful? Give feedback.
All reactions
-
π 1
-
π¬ Your Product Feedback Has Been Submitted π Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward β©
Where to look to see what's shipping π
What you can do in the meantime π»
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. β |
Beta Was this translation helpful? Give feedback.
All reactions
-
π 2
Uh oh!
There was an error while loading. Please reload this page.
-
Details are all jollygoodcode/jollygoodcode.github.io#6
Beta Was this translation helpful? Give feedback.
All reactions