GSA / FEDSIM_root

FEDSIM Site
Other
6 stars 10 forks source link

Security Policy violation Outside Collaborators #77

Closed gsa-allstar[bot] closed 6 months ago

gsa-allstar[bot] commented 7 months ago

This issue was automatically created by Allstar.

Security Policy Violation Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR


:warning: There is an updated version of this policy result! Click here to see the latest update


This issue will auto resolve when the policy is in compliance.

Issue created by Allstar. See https://github.com/ossf/allstar/ for more information. For questions specific to the repository, please contact the owner or maintainer.

gsa-allstar[bot] commented 7 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 7 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 7 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 7 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 7 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 7 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 7 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 7 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 7 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 7 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 7 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 7 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 7 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 7 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 7 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 7 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 7 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 7 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 7 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 6 outside collaborators with push access. Found 2 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

The policy result has been updated.


Found 4 outside collaborators with push access. Found 3 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 4 outside collaborators with push access. Found 3 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

The policy result has been updated.


Found 1 outside collaborators with push access. Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 1 outside collaborators with push access. Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 1 outside collaborators with push access. Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 1 outside collaborators with push access. Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 1 outside collaborators with push access. Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 1 outside collaborators with push access. Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 1 outside collaborators with push access. Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 1 outside collaborators with push access. Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 1 outside collaborators with push access. Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 1 outside collaborators with push access. Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 1 outside collaborators with push access. Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 1 outside collaborators with push access. Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 1 outside collaborators with push access. Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 1 outside collaborators with push access. Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 1 outside collaborators with push access. Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 1 outside collaborators with push access. Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 1 outside collaborators with push access. Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 1 outside collaborators with push access. Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 1 outside collaborators with push access. Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Updating issue after ping interval. See its status below.


Found 1 outside collaborators with push access. Found 1 outside collaborators with admin access. This policy requires users with this access to be members of the organisation. That way you can easily audit who has access to your repo, and if an account is compromised it can quickly be denied access to organization resources. To fix this you should either remove the user from repository-based access, or add them to the organization.

OR

If you don't see the Settings tab you probably don't have administrative access. Reach out to the administrators of the organisation to fix this issue.

OR

gsa-allstar[bot] commented 6 months ago

Policy is now in compliance. Closing issue.