Report vulnerability filtering: support scoped ignores #4022
Labels
kind/feature
Categorizes issue or PR as related to a new feature.
priority/backlog
Higher priority than priority/awaiting-more-evidence.
scan/misconfiguration
Issues relating to misconfiguration scanning
Milestone
Context:
.trivyignore
file (https://aquasecurity.github.io/trivy/v0.39/docs/vulnerability/examples/filter/#by-vulnerability-ids).trivyignore
file has repo-wide scope.Request:
Rather than wait for perfect inline filtering in every possible configuration format, we could enable per-file, per-path, or per-pattern filtering of findings in files before making any output or reporing.
For example, I could imagine a today-simple
.trivyignore
file likebecoming a more powerful and improved
.trivyignore.yaml
file:The text was updated successfully, but these errors were encountered: