Replies: 2 comments 1 reply
-
Hi @dvasdekis ! Trivy supports the ability to specify an expiry date for an ignore rule: #trivy:ignore:aws-s3-enable-logging:exp:2024-03-10
resource "aws_s3_bucket" "example" {
bucket = "test"
} Or do you need to specify an expiry date beyond the ignore rule declaration? |
Beta Was this translation helpful? Give feedback.
1 reply
-
Thanks @dvasdekis for the idea but this will require some work as you said today Trivy today works on checks that are directly mapped to their underlying resources (e.g. a check for an S3 bucket) rather than the variables it uses. A variable could be used anywhere and even reused across different resources. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Description
We would like Trivy to kick up a warning after a certain date, for known vulnerabilities that are being worked on, but don't yet have a fix. We would like to define this using inline comments, like
#trivy:warnafter:20250101
(or similar)The context is that we are using Trivy to scan a large Terraform repository. Terraform has custom module support, and Trivy isn't yet smart enough to detect issues in custom modules where we use variables to optionally select 'turning on' the feature with the vulnerability.
As an example, we might have a resource inside a module like the below:
and then the underlying resource definition within the module is like:
We want to be able to set a timeout on a line like the below in the module reference:
Target
None
Scanner
Vulnerability
Beta Was this translation helpful? Give feedback.
All reactions