Feedback on forced 7 day expiration and removal of automation tokens #174508
Replies: 2 comments
-
|
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
-
|
I completely agree with this. Cutting down expiry to 7 days without offering a scalable, secure replacement (like short-lived renewable tokens or scoped automation tokens managed via API) doesn’t solve the security concern — it just shifts the pain to maintainers and increases the chance of human error. It’d be great if GitHub could at least provide an interim mechanism or clearer migration guidance before enforcing this. The feedback here (and in #174506 / #174507) highlights exactly why this update might need a slower rollout or re-evaluation. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Select Topic Area
Product Feedback
Body
The announcement of removing automation tokens and shortening the max expiry to 7 days will be highly disruptive for no clear additional security improvements.
Due to lack of npm registry api's for token management, organizations like Netflix (my employer) rely on manual processes for managing publish access on various open source packages we maintain. Between these two changes announced yesterday, we are left with no good option to migrate to without immediate impact to our teams ability to support OSS package publishing.
In addition to the feedback in #174506, these changes seem to simply move the problem from one place to another and specifically breaks any setup's which relied on those tokens and third party secure workflows. Please consider keeping the forms of tokens available today intact until you can provide a secure replacement (not going to use this thread to get into that, I will do so in #174507).
Beta Was this translation helpful? Give feedback.
All reactions