Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🧩 Analysis chain
Add justification, expiration dates, and tracking for each suppressed vulnerability.
Suppressing security vulnerabilities—especially critical and high severity ones—without documentation is risky. The file lacks:
Without this context, future maintainers cannot assess whether these suppressions remain valid.
Apply this diff to add structured documentation:
To understand what you're suppressing, search for details on these specific vulnerability IDs:
🌐 Web query:
💡 Result:
Summary — AVD-AWS-0104
References
If you want, I can fetch the official AVD page and paste the exact examples and JSON/Terraform snippets.
🌐 Web query:
💡 Result:
I found authoritative details for AVD-DS-0002 and AVD-DS-0013 but could not locate a public AVD entry for AVD-DS-0019 — do you want me to keep searching or check a local Trivy/AVD copy you have?
AVD-DS-0002 — "Image user should not be 'root'": Trivy flags Dockerfiles/images that do not specify a non-root USER. Severity: HIGH. Recommended action: add a non-root USER instruction to the Dockerfile. See Trivy test data / AVD reference. [1][2]
AVD-DS-0013 — "RUN should not be used to change directory": Trivy flags RUN instructions that use cd (e.g.
RUN cd /home && mkdir app) and recommends using WORKDIR instead for readability/maintainability. Severity: MEDIUM (best-practice misconfiguration). See Trivy documentation / examples referencing AVD-DS-0013. [3]Sources
(If you want, I can: 1) continue searching specifically for AVD-DS-0019; 2) fetch the full AVD pages for each ID; or 3) show remediation examples/patch snippets.)
Add justification, expiration dates, and tracking for each suppressed vulnerability.
Suppressing security vulnerabilities—especially critical and high severity ones—without documentation is risky. The suppressions concern:
cd)For each suppression, document:
Without this, future maintainers cannot assess validity—especially critical for the CRITICAL and HIGH severity items.
🤖 Prompt for AI Agents