-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The ignore-base
, ignore-unchanged
, only-fixed
, only-severities
parameters should add-up together
#56
Comments
Very interesting point. I haven't tried it yet, but one temporary solution might be to use I'll open a discussion on this idea, to see if that's something we can improve. |
I might be mistaken, but if I do this, considering our image already has a critical vulnerability caused by Then this step will always fail, as this is being triggered on the analyzed image. But it's not a new vulnerability compared with our latest image, it's an existing and acknowledged one. In any case, can I make Extra informationBased on what gosu's author suggest, this specific vulnerability should be treated as a false positive. Considering their Security README states the following:
But this is feedback for Scout, and not for this action. |
Issue
I've been implementing this action to ensure our engineering team is informed if new vulnerabilities are introduced into our Docker image through the development process, particularly in PRs.
We want to avoid overwhelming the team with action comments in the PRs, as this could lead to warning fatigue. If notifications aren't actionable, they will likely be ignored over time.
Expected behavior
To address this, I would expect the ignore-unchanged option to prevent cves, recommendations, or compare information from being displayed when no new vulnerabilities have been introduced compared to the base image.
Additionally, the following options should work together:
ignore-base
,ignore-unchanged
,only-fixed
,only-severities
.Here’s what I envision:
This configuration would only display information in a PR if: there are new fixable high or critical vulnerabilities in the built image. Otherwise no information is displayed in the PR.
Current behavior
Even with all these parameters, comments will be displayed under the above condition.
The text was updated successfully, but these errors were encountered: