-
Notifications
You must be signed in to change notification settings - Fork 451
feat: hide unimportant vulns by default #1970
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #1970 +/- ##
==========================================
+ Coverage 65.37% 65.41% +0.04%
==========================================
Files 176 176
Lines 17180 17206 +26
==========================================
+ Hits 11231 11256 +25
- Misses 5187 5189 +2
+ Partials 762 761 -1 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
Is there a reason why you've gone with a flag vs adding support for this as a config option? as the latter sounds like it would address the reason behind #1968. Not saying it's wrong, just keen to hear a bit more about the offline discussions that have happened on this before I review. fwiw I'm also a little hesitant on having this be the default, but that might just be because I work in languages that don't have call analysis and the idea is it'll be far more mainstream in future? (I'm use to dealing with security frameworks that say "all vulns must be patched" which without CA means truly patching anything that gets called a vuln by an advisory...) |
I think we should add both. |
@G-Rath Just want to understand what you meant by:
I think this PR will have no effect on those languages right? As there won't be CA to mark vulns as unimportant, so there won't be any change. |
Right now there isn't CA but the goal is to have that for as many languages as possible ay? it might be (a lot) harder for some languages than others to the point that it could take decades but the goal is still to have it is my understanding. I think my feelings on this are due to uncertainty in the confidence of the CA - similar to how there are tools for detecting "secrets" in code that are literally just searching for the word "secret" in variable names; what if someone starts shipping a CA for a new language that is similar but maybe a bit smarter than that? with this being the default that means suddenly a bunch of vulns are no longer being signaled to me because some persons But I think that's actually already accounted for by us humans doing the building - yes what I've said is technically possible, but in practice we'd decide that that CA isn't reliable enough yet to "trust" with being used in this context as a default and so wouldn't adopt it; and likewise I expect as we got closer to having CA in a new language we'd consider how it gets rolled out including "whats the confidence" and probably use an experimental flag for a bit, and so on. so tl;dr happy to discuss my feelings more but I don't think it needs to be a blocker to making this a default 🙂 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think we should at least print a line "Hiding X number of vulnerabilities deemed unimportant, use --all-vulnsto show them." if there are unimportant vulns so at least they are not silently dropped. Other wise LGTM
Added this message into table container view and vertical output. I will add it to the regular table output after we replace it with internal structure (#1609). |
Resolves #1968
Hides unimportant/uncalled vulns by default, and adds a
--all-vulns
flag to show all.Returns 0 if only unimportant vulns.
Add an ignorePacakge filter to DoContainerScan()