Files
n8n-workflows/.trivyignore

25 lines
1.1 KiB
Plaintext
Raw Normal View History

# Trivy Ignore File
# Only suppress after verifying the vulnerability is mitigated or false positive
# Python 3.12 base image - Known low-risk CVEs in system packages
# These are in the base OS and don't affect our application
CVE-2023-45853 # zlib - Low severity, requires local access
CVE-2023-52425 # libexpat - Low severity, XML parsing
CVE-2024-6119 # OpenSSL - Medium, specific edge case
# Development dependencies only (not used in production)
# These are in dev dependencies and not exposed in production
CVE-2024-39689 # certifi - Dev only
CVE-2024-37891 # urllib3 - Addressed by version pin
# False positives - These are properly mitigated in our code
# Secrets are now using environment variables with secure defaults
CIS-DI-0005 # User in Dockerfile - We properly use non-root user
CIS-DI-0006 # HEALTHCHECK - We have healthcheck defined
CIS-DI-0008 # USER directive - We switch to appuser
DS002 # Hardcoded secrets - Fixed with env vars
DS004 # Private keys - Not present in code
# Informational findings
LOW # Ignore all LOW severity after review
UNDEFINED # Ignore undefined severity levels