- Disable the rule under SAST Rules
- Use the
include-pathandexclude-pathto scan parts of the project
Detected Potential Open Redirect Vulnerability in Angular Application, as exceptions.
- Select Policies & Rules from the left sidebar.
- Select EXCEPTION POLICIES.
- Click Create Exception Policy to create a new exception policy.
- Select Standard Exception Find Attributes as the POLICY TEMPLATE.
-
Enter
Detected Potential Open Redirect Vulnerability in Angular Applicationin Finding Name Contains. -
Select from the following reasons why you are applying this exception:
- In Triage: The finding is still being triaged for more information.
- False Positive: The finding is a false positive.
- Risk Accepted: The risk associated with the finding is accepted.
- Other: Another reason applies for this exception.
- Select when the exception should expire. Options include 30, 60, 90 days, and Never.
-
Assign Scope for which this exception policy should apply. Scopes are defined by the tags assigned to a project.
- In Inclusions, enter the tags of the projects that you want to apply an exception to.
- In Exclusions, enter the tags of the projects that you do not want to apply an exception to. Exclusions take precedence over the inclusions, in case of a conflict.
- Click the link to view the projects included in the finding policy.
- Enter a human-readable Name for your exception policy.
- Enter a Description for your exception policy that explains its function.
- Enter any Policy Tags that you want to associate with your policy. Tags can have a maximum of 255 characters and can contain letters, numbers, and characters = @ _ -
- Click Create Exception Policy.
Create exceptions from the findings
You can also create exceptions directly from a finding.- Select Projects from the left sidebar.
- Search for and select a project, and select Findings.
- Search for findings using advanced or basic filters.
- Select findings and click the vertical three dots.
- Select Add Exception Policy.
- Select a template or create the policy from scratch. The template parameters are automatically pre-filled based on the selected finding.
- Click Create Exception Policy.
Detected Potential time of check time of use vulnerability (open/fopen): ID #e81f27. This exception policy after creation only applies to the SAST findings with this hash ID and not any others.