-
Notifications
You must be signed in to change notification settings - Fork 17.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x/vuln: add support for suppressing vulnerabilities by ID #59507
Comments
In my case, I'm wanting this because |
We would love to support this solution. 👍 In our case, our pipelines are set to fail if govulncheck fails. That being said, not all govulncheck errors are necessarily related to our production code use-cases. Is kind of an industry standard to make false-positives ignored in vulnarability checks, static code analysis tools etc. Thx. 👍 |
govulncheck does not support ignoring a particular vulnerability. Since we're on ibc-go v6.2.x which has a vulnerability, CI will report a red X on all future PRs because govulncheck fails. This PR removes govulncheck. We can re-enable it when govulncheck adds support for ignoring a particular vulnerability. See: 1. golang/go#59507 1. golang/go#61211
This would be useful for cases like https://pkg.go.dev/vuln/GO-2024-2698 which has "no known fix". |
What's an example of vulnerability flagged by govulncheck yet not actually in a reachable code path? that seems would be a bug in govulncheck, not something to exclude but something to fix (if there is such a thing?) |
https://pkg.go.dev/vuln/GO-2024-2994 is such an example. https://pkg.go.dev/vuln/GO-2024-2746 is basically the same kind of example. |
We'd love to be able to suppress all windows vulnerabilities. We never deploy to windows, so seeing those vulns are simply noise for us. |
We have a common pattern of a "stable release" that is supported with security fixes only, that ends up in that state for a number of years. Having a tool like govulncheck is ideal, because it lets us be aware that there might be a security issue, but we also need a way to acknowledge that this particular issue does not warrant a Major.Minor compiler update. However, we don't want to skip doing the check entirely, because a new issue on the compiler might very much warrant the effort. Having a clear way to record issues that you've acknowledged, but still see ones that you haven't seen before is very useful. |
There is PR golang/vuln#7 that implements this feature. |
We are actively working on this feature. We don't have an exact timeline, but there won't be a need for a proposal. We plan to use OpenVex format for specifying vulnerability info for filtering. |
What version of Go are you using (
go version
)?What operating system and processor architecture are you using (
go env
)?go env
OutputHi,
Requesting to introduce a config file (ideally) or a flag that allows users to explicitly exclude some vulnerabilities? Maybe until they resolve them, they can be suppressed in CI so on.
Thanks
Config file
# vuln.yaml vulnerability: exclude: - GO-2023-1704 - GO-2023-1705
Flag
The text was updated successfully, but these errors were encountered: