Hacker News new | past | comments | ask | show | jobs | submit login

GitHub’s security scopes are the closest that I’ve come to dropping them.

When I create a token, I have to grant access to all repos or none. That’s crazy since I admin some stuff any token I have for work means it’s a risk to everything.

Also, there’s no read-only scope for some admin functions. So to read private repo metadata for simple auditing purposes I have to grant access to edit them as well. That’s crazy.

Same for repo access. The fact that I can’t create a read only token for a repo is annoying.

I think this is a legacy from them not having a nuanced security model and it’s annoying.

The only around this now is to create different user accounts and that’s annoying.




Yeah the way token permissions are implemented totally baffles me every time. I never know if I’m creating a token for read or write or both.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: