We request minimum permissions, protect tokens like vault keys, and provide auditable logs and deletion controls.
Only the scopes required for publishing.
Treat tokens like keys to a vault.
Concrete controls, not vague claims.
Explicit and review-friendly.