security: disable Vault secret scans due to false positives (#20264)

This was recently shown to have issues with false positives that blocked
a preview release build, so disabling for now.
pull/20277/head
Michael Zalimeni 10 months ago committed by GitHub
parent c40b59823a
commit b03d770dc3
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

@ -17,7 +17,19 @@ container {
alpine_secdb = true
secrets {
all = true
matchers = {
// Use default list, minus Vault (`hashicorp`), which has experienced false positives.
// See https://github.com/hashicorp/security-scanner/blob/v0.0.2/pkg/scanner/secrets.go#L130C2-L130C2
known = [
// "hashicorp",
"aws",
"google",
"slack",
"github",
"azure",
"npm",
]
}
}
# Triage items that are _safe_ to ignore here. Note that this list should be
@ -41,6 +53,16 @@ binary {
# (yarn.lock) in the Consul binary. This is something we may investigate in the future.
secrets {
all = true
// Use most of default list, minus Vault (`hashicorp`), which has experienced false positives.
// See https://github.com/hashicorp/security-scanner/blob/v0.0.2/pkg/scanner/secrets.go#L130C2-L130C2
known = [
// "hashicorp",
"aws",
"google",
"slack",
"github",
"azure",
"npm",
]
}
}

Loading…
Cancel
Save