mirror of
https://github.com/aquasecurity/trivy.git
synced 2025-12-19 18:45:10 -08:00
59 lines
1.3 KiB
Rego
59 lines
1.3 KiB
Rego
package trivy
|
|
|
|
import data.lib.trivy
|
|
|
|
default ignore = false
|
|
|
|
ignore_pkgs := {"bash", "bind-license", "rpm", "vim", "vim-minimal"}
|
|
|
|
ignore_severities := {"LOW", "MEDIUM"}
|
|
|
|
nvd_v3_vector = v {
|
|
v := input.CVSS.nvd.V3Vector
|
|
}
|
|
|
|
redhat_v3_vector = v {
|
|
v := input.CVSS.redhat.V3Vector
|
|
}
|
|
|
|
ignore {
|
|
input.PkgName == ignore_pkgs[_]
|
|
}
|
|
|
|
ignore {
|
|
input.Severity == ignore_severities[_]
|
|
}
|
|
|
|
# Ignore a vulnerability which is not remotely exploitable
|
|
ignore {
|
|
nvd_cvss_vector := trivy.parse_cvss_vector_v3(nvd_v3_vector)
|
|
nvd_cvss_vector.AttackVector != "Network"
|
|
|
|
redhat_cvss_vector := trivy.parse_cvss_vector_v3(redhat_v3_vector)
|
|
redhat_cvss_vector.AttackVector != "Network"
|
|
}
|
|
|
|
# Ignore a vulnerability which requires high privilege
|
|
ignore {
|
|
nvd_cvss_vector := trivy.parse_cvss_vector_v3(nvd_v3_vector)
|
|
nvd_cvss_vector.PrivilegesRequired == "High"
|
|
|
|
redhat_cvss_vector := trivy.parse_cvss_vector_v3(redhat_v3_vector)
|
|
redhat_cvss_vector.PrivilegesRequired == "High"
|
|
}
|
|
|
|
# Ignore a vulnerability which requires user interaction
|
|
ignore {
|
|
nvd_cvss_vector := trivy.parse_cvss_vector_v3(nvd_v3_vector)
|
|
nvd_cvss_vector.UserInteraction == "Required"
|
|
|
|
redhat_cvss_vector := trivy.parse_cvss_vector_v3(redhat_v3_vector)
|
|
redhat_cvss_vector.UserInteraction == "Required"
|
|
}
|
|
|
|
# Ignore CSRF
|
|
ignore {
|
|
# https://cwe.mitre.org/data/definitions/352.html
|
|
input.CweIDs[_] == "CWE-352"
|
|
}
|