github.com/devseccon/trivy@v0.47.1-0.20231123133102-bd902a0bd996/pkg/result/testdata/.trivyignore.yaml (about) 1 vulnerabilities: 2 - id: CVE-2019-0001 3 paths: 4 - "**/*-lock.json" 5 - id: CVE-2019-0002 6 paths: 7 - "bar/package.json" 8 - id: CVE-2019-0003 9 - id: CVE-2019-0004 10 paths: 11 - "bar/package.json" 12 - id: CVE-2019-0005 13 expired_at: 2023-01-01 14 - id: CVE-2019-0006 15 expired_at: 2020-01-01 16 17 misconfigurations: 18 - id: ID100 19 - id: ID200 20 paths: 21 - "app/Dockerfile" 22 - id: ID300 23 paths: 24 - "docs/Dockerfile" 25 secrets: 26 - id: generic-unwanted-rule 27 - id: generic-unwanted-rule2 28 paths: 29 - "**/config.yaml" 30 - id: generic-wanted-rule 31 paths: 32 - "foo/secret.txt" 33 licenses: 34 - id: GPL-3.0 35 paths: 36 - "usr/share/gcc/python/libstdcxx/v6/__init__.py"