Loading .trivyignore.yaml +3 −0 Original line number Diff line number Diff line vulnerabilities: - id: CVE-2024-24790 # CVE-2025-68121: I see not option to fix this accross all go tools that use all static bindings. # Maintainers Red Hat, K8 SIG need to do their homework. - id: CVE-2025-68121 misconfigurations: - id: AVD-DS-0011 description: | Loading trivy.yaml +1 −5 Original line number Diff line number Diff line scan: skip-dirs: - "templates/trivy/tests/**" No newline at end of file vulnerabilities: # CVE-2025-68121: I see not option to fix this accross all go tools that use all static bindings. # Maintainers Red Hat, K8 SIG need to do their homework. - id: CVE-2025-68121 No newline at end of file Loading
.trivyignore.yaml +3 −0 Original line number Diff line number Diff line vulnerabilities: - id: CVE-2024-24790 # CVE-2025-68121: I see not option to fix this accross all go tools that use all static bindings. # Maintainers Red Hat, K8 SIG need to do their homework. - id: CVE-2025-68121 misconfigurations: - id: AVD-DS-0011 description: | Loading
trivy.yaml +1 −5 Original line number Diff line number Diff line scan: skip-dirs: - "templates/trivy/tests/**" No newline at end of file vulnerabilities: # CVE-2025-68121: I see not option to fix this accross all go tools that use all static bindings. # Maintainers Red Hat, K8 SIG need to do their homework. - id: CVE-2025-68121 No newline at end of file