This reduces the attack surface if the workflows are ever compromised.
Co-authored-by: Mohammed Anas <triallax@tutanota.com>