Company
Date Published
Author
Daniel Berman
Word count
1845
Language
English
Hacker News points
None

Summary

Snyk provides various ways to ignore security issues, including using the Snyk CLI, API, UI, or .snyk policy file. The method used depends on the specific use case and organization's policies. Ignoring vulnerabilities is necessary for development teams to prioritize their work effectively, but it should not be a default practice. Not all vulnerabilities are equal, and some can be ignored due to lack of fix availability, irrelevance, or other characteristics. Security solutions must enable developers to suppress vulnerabilities while providing security teams with control over who ignores what. The Snyk platform provides tools such as automated pull requests, security policies, and the .snyk policy file to help manage ignores in a measured way. It is essential to review ignores on a regular basis and set the right balance between developer productivity and security measures.