# Copyright (c) HashiCorp, Inc. # SPDX-License-Identifier: BUSL-1.1 # These scan results are run as part of CRT workflows. # Un-triaged results will block release. See `security-scanner` docs for more # information on how to add `triage` config to unblock releases for specific results. # In most cases, we should not need to disable the entire scanner to unblock a release. # To run manually, install scanner and then from the repository root run # `SECURITY_SCANNER_CONFIG_FILE=.release/security-scan.hcl scan ...` # To scan a local container, add `local_daemon = true` to the `container` block below. # See `security-scanner` docs or run with `--help` for scan target syntax. container { dependencies = true alpine_secdb = true secrets { matchers { // Use most of default list, minus Vault (`hashicorp`), which has experienced false positives. // See https://github.com/hashicorp/security-scanner/blob/v0.0.2/pkg/scanner/secrets.go#L130C2-L130C2 known = [ // "hashicorp", "aws", "google", "slack", "github", "azure", "npm", ] } } # Triage items that are _safe_ to ignore here. Note that this list should be # periodically cleaned up to remove items that are no longer found by the scanner. triage { suppress { # N.b. `vulnerabilites` is the correct spelling for this tool. vulnerabilites = [ "CVE-2023-46218", # curl@8.4.0-r0 "CVE-2023-46219", # curl@8.4.0-r0 "CVE-2023-5678", # openssl@3.1.4-r0 ] } } } binary { go_modules = true osv = true # We can't enable npm for binary targets today because we don't yet embed the relevant file # (yarn.lock) in the Consul binary. This is something we may investigate in the future. secrets { matchers { // Use most of default list, minus Vault (`hashicorp`), which has experienced false positives. // See https://github.com/hashicorp/security-scanner/blob/v0.0.2/pkg/scanner/secrets.go#L130C2-L130C2 known = [ // "hashicorp", "aws", "google", "slack", "github", "azure", "npm", ] } } }