diff --git a/.safety-policy.yml b/.safety-policy.yml new file mode 100644 index 0000000..71098c3 --- /dev/null +++ b/.safety-policy.yml @@ -0,0 +1,15 @@ +security: + ignore-cvss-severity-below: 4 + ignore-vulnerabilities: + 70612: + # CVE-2019-8341, jinja2: + # + # In summary, the CVE says that it is unsafe to use untrusted + # user input as Jinja template sources as arbitrary code execution + # is possible. This should be obvious, so unsurprisingly Jinja + # maintainers and various third-parties reject/dispute the CVE, + # including Red Hat in https://bugzilla.redhat.com/show_bug.cgi?id=1677653 + # + reason: >- + Not exploitable: user input is not used in any Jinja template sources + continue-on-vulnerability-error: False