From 70ad8731021b573d2a2b69926696b6febecd89b2 Mon Sep 17 00:00:00 2001 From: Thomas Pierce Date: Fri, 20 Mar 2026 09:09:32 -0700 Subject: [PATCH] Add Trivy and DependencyCheck suppression files --- .github/dependency-check-suppressions.xml | 3 +++ .github/trivy/daily-scan.trivyignore.yaml | 13 +++++++++++++ .github/workflows/daily-scan.yml | 6 +++++- 3 files changed, 21 insertions(+), 1 deletion(-) create mode 100644 .github/dependency-check-suppressions.xml create mode 100644 .github/trivy/daily-scan.trivyignore.yaml diff --git a/.github/dependency-check-suppressions.xml b/.github/dependency-check-suppressions.xml new file mode 100644 index 00000000..fbf9371b --- /dev/null +++ b/.github/dependency-check-suppressions.xml @@ -0,0 +1,3 @@ + + + diff --git a/.github/trivy/daily-scan.trivyignore.yaml b/.github/trivy/daily-scan.trivyignore.yaml new file mode 100644 index 00000000..940269c2 --- /dev/null +++ b/.github/trivy/daily-scan.trivyignore.yaml @@ -0,0 +1,13 @@ +# Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. +# SPDX-License-Identifier: Apache-2.0 + +# Trivy ignore file for daily scans. +# This file is intentionally empty. Daily scans should flag all CVEs. +# See: https://aquasecurity.github.io/trivy/latest/docs/configuration/filtering/ + +# Format: +# - id: +# statement: " " +# expired_at: + +vulnerabilities: [] diff --git a/.github/workflows/daily-scan.yml b/.github/workflows/daily-scan.yml index 389eaf27..ef5599db 100644 --- a/.github/workflows/daily-scan.yml +++ b/.github/workflows/daily-scan.yml @@ -73,7 +73,7 @@ jobs: curl -Ls "https://github.com/dependency-check/DependencyCheck/releases/download/v$VERSION/dependency-check-$VERSION-release.zip.asc" --output dependency-check.zip.asc gpg --verify dependency-check.zip.asc unzip dependency-check.zip - ./dependency-check/bin/dependency-check.sh --enableExperimental --failOnCVSS 0 --nvdApiKey ${{ env.NVD_API_KEY_NVD_API_KEY }} --ossIndexUsername ${{ env.OSS_INDEX_USERNAME }} --ossIndexPassword ${{ env.OSS_INDEX_PASSWORD }} -s "scan-target/" + ./dependency-check/bin/dependency-check.sh --enableExperimental --failOnCVSS 0 --nvdApiKey ${{ env.NVD_API_KEY_NVD_API_KEY }} --ossIndexUsername ${{ env.OSS_INDEX_USERNAME }} --ossIndexPassword ${{ env.OSS_INDEX_PASSWORD }} --suppression .github/dependency-check-suppressions.xml -s "scan-target/" - name: Print dependency scan results on failure if: ${{ steps.dep_scan.outcome != 'success' }} @@ -89,6 +89,8 @@ jobs: severity: 'CRITICAL,HIGH' exit-code: '1' scanners: 'vuln' + env: + TRIVY_IGNOREFILE: .github/trivy/daily-scan.trivyignore.yaml - name: Perform low severity scan on built artifacts if: always() @@ -100,6 +102,8 @@ jobs: severity: 'MEDIUM,LOW,UNKNOWN' exit-code: '1' scanners: 'vuln' + env: + TRIVY_IGNOREFILE: .github/trivy/daily-scan.trivyignore.yaml - name: Configure AWS Credentials for emitting metrics if: always()