Conversation
There was a problem hiding this comment.
💡 Codex Review
Here are some automated review suggestions for this pull request.
Reviewed commit: 76772a2eb9
ℹ️ About Codex in GitHub
Codex has been enabled to automatically review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
When you sign up for Codex through ChatGPT, Codex can also answer questions or update the PR, like "@codex address that feedback".
There was a problem hiding this comment.
💡 Codex Review
Here are some automated review suggestions for this pull request.
Reviewed commit: 73eb26379c
ℹ️ About Codex in GitHub
Codex has been enabled to automatically review pull requests in this repo. Reviews are triggered when you
- Open a pull request for review
- Mark a draft as ready
- Comment "@codex review".
If Codex has suggestions, it will comment; otherwise it will react with 👍.
When you sign up for Codex through ChatGPT, Codex can also answer questions or update the PR, like "@codex address that feedback".
| check-music-releases: | ||
| runs-on: self-hosted |
There was a problem hiding this comment.
Restrict self-hosted runner for pull_request jobs
This job runs on a self-hosted runner while the workflow is triggered by pull_request events. If the repo accepts PRs from forks or untrusted contributors, their code will execute on your self-hosted runner, which can expose internal network access or local credentials that GitHub-hosted runners don’t protect. Consider limiting this workflow to trusted branches/actors or moving PR runs to a GitHub-hosted runner so untrusted code can’t run on the self-hosted machine.
Useful? React with 👍 / 👎.
https://github.com/atls/infrastructure/issues/522