Skip to content

Commit d7bd126

Browse files
Add vulnerability ignore rules
1 parent 0cea2c9 commit d7bd126

File tree

1 file changed

+12
-0
lines changed

1 file changed

+12
-0
lines changed

WORKSPACE.yaml

+12
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,18 @@ provenance:
3333
slsa: true
3434
sbom:
3535
enabled: true
36+
ignoreVulnerabilities:
37+
- vulnerability: GHSA-fx4w-v43j-vc45
38+
reason: |
39+
This vulnerability in TypeORM's findOne / findOneOrFail functions can improperly interpret a crafted JSON object
40+
and concatenate it into raw SQL, potentially allowing SQL injection attacks.
41+
42+
In Gitpod’s usage, TypeORM is not exposed to arbitrary user input. For example, DB migrations run preset queries;
43+
the server/bridge code does not hand raw JSON from external sources to findOne. Therefore, there is no path for
44+
injecting malicious JSON into a query, rendering the vulnerability non-exploitable.
45+
- vulnerability: GHSA-2jcg-qqmg-46q6
46+
reason: |
47+
This is a false positive. See https://github.com/browserify/resolve/issues/303
3648
environmentManifest:
3749
- name: "go"
3850
command: ["sh", "-c", "go version | sed s/arm/amd/"]

0 commit comments

Comments
 (0)