Replies: 4 comments 3 replies
-
@z4l1nux Yep. Both are possible with
We built vet-action to wrap
This is exactly the reason why we adopted policy as code in To get started with If you are integrating |
Beta Was this translation helpful? Give feedback.
-
During my tests, vet continues to find vulnerable dependencies that were already main and not just the new vulnerabilities included in the PR in another branch. Another question is, if I remove the other filters from policy.yml and leave only the name: critical-or-high-vulns, will it only fail when this occurs? |
Beta Was this translation helpful? Give feedback.
-
|
Beta Was this translation helpful? Give feedback.
-
vet Summary Report Policy Checks Threats That seems to have worked now, I think I was doing something wrong before. What would the policy look like for ignoring certain alerts in the event of a false positive being identified, risk accepted and so on? Example: detected threats or Vulnerability, Malware, License, Popularity, Maintenance, Security Posture |
Beta Was this translation helpful? Give feedback.
-
It's not clear to me whether the tool has the functionality to fail the pipeline only when new vulnerabilities are found, instead of simply scanning the entire repository again. This would allow blocking only the introduction of new vulnerabilities without affecting already known issues.
Additionally, I would like to know if it's possible to configure the tool to consider only High and Critical vulnerabilities initially, paranoia levels can be created from any severity (Critical, High, Medium or Low), allowing other modules (malware, license, popularity, maintenance, security posture and threats) to be enabled progressively as the team gains maturity.
Beta Was this translation helpful? Give feedback.
All reactions