Replies: 15 comments 4 replies
-
every CI provider has this problem as well -- using a CI provider on any repo requires giving them access to everything. specifically bad problem for people who are in multiple organizations or who have a mix of public + private repos circleci has a docs page about it:
more granular scope would make it safer to use all kinds of codebase plugins another approach would be to create a 'scoped subset' of my account that has access only to certain repos or organizations -- then the plugin vendor wouldn't have to worry about permissions at the moment, is the best practice to create a whole new github account? |
Beta Was this translation helpful? Give feedback.
-
@github-staff this discussion + a good amount of StackOverflow posts reference this issue all the way back to 2015-2016. Can you at least give a corporate-friendly answer to why more read-only scopes are not a thing yet? Just repeating what everyone thinks about not having them:
|
Beta Was this translation helpful? Give feedback.
-
I can't believe this has been completely ignored for YEARS... |
Beta Was this translation helpful? Give feedback.
-
https://github.blog/2022-10-18-introducing-fine-grained-personal-access-tokens-for-github/ 👀 |
Beta Was this translation helpful? Give feedback.
-
@github 🆘 🆘 🆘 Please let us know if you plan to fix this crucial issue for App Developers! This limits the use of applications in Github significantly because clients don't want to install apps due to excessive scope! Please give us the ability to request read-only repos in OAuth App Scopes. |
Beta Was this translation helpful? Give feedback.
-
Please help |
Beta Was this translation helpful? Give feedback.
-
It's crazy how GitHub OAuth still lacks a read-only scope for repos, despite an open issue since 2015. Hopefully, GitHub will prioritize this feature soon, as the fine-grained personal access tokens don't fit all the use cases. |
Beta Was this translation helpful? Give feedback.
-
Damn, same problem here, I wasn't expecting this much messages but it reassure me about the fact that I'm in need of this feature (just a simple repo:read would be nice) My company is ok for using a really helpful tool but the scopes necessary to read repositories are too high at the moment and it makes no sense |
Beta Was this translation helpful? Give feedback.
-
Hey everyone, So I encountered that problem a few minutes ago as well, but I managed to find a solution!
I just used that and it worked! The number of available scopes is limited but it's a start Hope this helps ✌️ |
Beta Was this translation helpful? Give feedback.
-
Hey @frgfm! The problem we're discussing is that there is no read-only scope for a user's public and/or private repositories. The link you provided confirms this issue. Please refer to the original message in the discussion! |
Beta Was this translation helpful? Give feedback.
-
From what I have read this discussion has been going on for some time, so not going to hold my breath. But as many others have mentioned, it would be prudent from a security perspective to be able to limit access to read only on private repos for example. It seems a bit heavy handed to grant read/write/all access to apps that just want to read data. Anyone found an explanation as to why this is not and will not be implemented? |
Beta Was this translation helpful? Give feedback.
-
There appears to be an option exactly like this for projects:
|
Beta Was this translation helpful? Give feedback.
-
Why can't an OAuth login request read-only access to a specific repo, as well? Why does it have to be all private repos? |
Beta Was this translation helpful? Give feedback.
-
With the official GitHub MCP server now available, AI tools need secure, least-privilege access to both public and private repos. Today most clients fall back to long-lived PATs—cumbersome to rotate and prone to over-permission. By adopting OAuth 2.1 (PKCE, no implicit flow, fine-grained scopes) in MCP servers—and exposing a read-only scope for cloning/status checks—AI agents could obtain short-lived, read-only tokens via standard flows (see draft: https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1). Managed providers like Composio’s MCP server already support OAuth out-of-the-box, handling token refresh and security best practices. Exposing a read-only OAuth scope will streamline credential management and enforce least-privilege for AI-driven workflows. |
Beta Was this translation helpful? Give feedback.
-
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Details are all jollygoodcode/jollygoodcode.github.io#6
Beta Was this translation helpful? Give feedback.
All reactions