1.3 KiB
1.3 KiB
Write Mode
Threat Model
Write mode introduces mutation risk (issue/PR changes, metadata updates). Risks include unauthorized action, accidental mass updates, and audit evasion.
Default Posture
WRITE_MODE=falseby default.- When enabled, writes require repository whitelist membership by default.
- Optional opt-in:
WRITE_ALLOW_ALL_TOKEN_REPOS=trueallows writes to any repo the token can access. - Policy engine remains authoritative and may deny specific write tools.
Supported Write Tools
create_issueupdate_issuecreate_issue_commentcreate_pr_commentadd_labelsassign_issue
Not supported (explicitly forbidden): merge actions, branch deletion, force push.
Enablement Steps
- Set
WRITE_MODE=true. - Choose one:
WRITE_REPOSITORY_WHITELIST=owner/repo,...(recommended)WRITE_ALLOW_ALL_TOKEN_REPOS=true(broader scope)
- Review policy file for write-tool scope.
- Verify audit logging and alerting before rollout.
Safe Operations
- Start with one repository in whitelist.
- Use narrowly scoped bot credentials.
- Require peer review for whitelist/policy changes.
- Disable write mode during incident response if abuse is suspected.
Risk Tradeoffs
Write mode improves automation and triage speed but increases blast radius. Use least privilege, tight policy, and strong monitoring.