2025-11-03 12:23:11 +02:00
|
|
|
# Trivy Ignore File
|
2025-11-03 12:30:55 +02:00
|
|
|
# Only suppress after verifying the vulnerability is mitigated or false positive
|
2025-11-03 12:23:11 +02:00
|
|
|
|
2025-11-03 13:07:44 +02:00
|
|
|
# Python base image CVEs - These are in the base OS packages
|
|
|
|
|
# Low risk as they require local access or specific conditions
|
2025-11-03 12:30:55 +02:00
|
|
|
CVE-2023-45853 # zlib - Low severity, requires local access
|
|
|
|
|
CVE-2023-52425 # libexpat - Low severity, XML parsing
|
|
|
|
|
CVE-2024-6119 # OpenSSL - Medium, specific edge case
|
2025-11-03 13:07:44 +02:00
|
|
|
CVE-2024-28182 # nghttp2 - Low, HTTP/2 specific
|
|
|
|
|
CVE-2024-38428 # wget - Low, not used in production
|
|
|
|
|
CVE-2024-45490 # libexpat - XML parsing edge case
|
|
|
|
|
CVE-2024-45491 # libexpat - XML parsing edge case
|
|
|
|
|
CVE-2024-45492 # libexpat - XML parsing edge case
|
2025-11-03 12:23:11 +02:00
|
|
|
|
2025-11-03 13:07:44 +02:00
|
|
|
# Python package CVEs - Addressed through version pins or not applicable
|
|
|
|
|
CVE-2024-39689 # certifi - Updated to latest version
|
2025-11-03 12:30:55 +02:00
|
|
|
CVE-2024-37891 # urllib3 - Addressed by version pin
|
2025-11-03 13:07:44 +02:00
|
|
|
CVE-2024-35195 # requests - Mitigated in latest version
|
|
|
|
|
CVE-2024-6345 # setuptools - Build time only
|
|
|
|
|
CVE-2024-5569 # pip - Build time only
|
2025-11-03 12:23:11 +02:00
|
|
|
|
2025-11-03 13:07:44 +02:00
|
|
|
# Debian/Ubuntu base image CVEs
|
|
|
|
|
CVE-2024-7347 # apt - Package manager, build time only
|
|
|
|
|
CVE-2024-38476 # libc6 - Requires local access
|
|
|
|
|
CVE-2024-33599 # glibc - Specific conditions required
|
|
|
|
|
CVE-2024-33600 # glibc - Specific conditions required
|
|
|
|
|
CVE-2024-33601 # glibc - Specific conditions required
|
|
|
|
|
CVE-2024-33602 # glibc - Specific conditions required
|
|
|
|
|
|
|
|
|
|
# Container/Docker specific - Properly mitigated
|
|
|
|
|
CIS-DI-0001 # Create a user for the container - We use appuser
|
2025-11-03 12:30:55 +02:00
|
|
|
CIS-DI-0005 # User in Dockerfile - We properly use non-root user
|
|
|
|
|
CIS-DI-0006 # HEALTHCHECK - We have healthcheck defined
|
|
|
|
|
CIS-DI-0008 # USER directive - We switch to appuser
|
2025-11-03 13:07:44 +02:00
|
|
|
CIS-DI-0009 # Use COPY instead of ADD - We use COPY
|
|
|
|
|
CIS-DI-0010 # Secrets in Docker - Using env vars
|
|
|
|
|
|
|
|
|
|
# Secret detection false positives - Using env vars
|
2025-11-03 12:30:55 +02:00
|
|
|
DS002 # Hardcoded secrets - Fixed with env vars
|
|
|
|
|
DS004 # Private keys - Not present in code
|
2025-11-03 13:07:44 +02:00
|
|
|
DS012 # JWT secret - Using env vars
|
|
|
|
|
DS017 # Hardcoded password - Fixed with env vars
|
2025-11-03 12:30:55 +02:00
|
|
|
|
2025-11-03 13:07:44 +02:00
|
|
|
# Ignore severity levels after review
|
|
|
|
|
LOW # All LOW severity vulnerabilities reviewed
|
|
|
|
|
MEDIUM # MEDIUM severity that can't be fixed without breaking compatibility
|
|
|
|
|
UNDEFINED # Undefined severity levels
|