From 0ce0f4248885058255590f39ad6759d945fe2a03 Mon Sep 17 00:00:00 2001 From: Niall Byrne <9848926+niall-byrne@users.noreply.github.com> Date: Wed, 27 Nov 2024 13:54:18 -0500 Subject: [PATCH] ci(SECURITY): bypass 73282 sqlitedict cve --- .vale/Vocab/pi_portal/accept.txt | 1 + assets/Makefile | 4 +++- 2 files changed, 4 insertions(+), 1 deletion(-) diff --git a/.vale/Vocab/pi_portal/accept.txt b/.vale/Vocab/pi_portal/accept.txt index 698b6805..2e37346a 100644 --- a/.vale/Vocab/pi_portal/accept.txt +++ b/.vale/Vocab/pi_portal/accept.txt @@ -8,5 +8,6 @@ pi_portal pib_cli setuptools slack_cli +sqlitedict xmlrpc zipp diff --git a/assets/Makefile b/assets/Makefile index 92a6f724..ce17fcd5 100644 --- a/assets/Makefile +++ b/assets/Makefile @@ -153,7 +153,9 @@ security-leaks: security-safety: @echo "Checking all dependencies ..." - @$(call p, "pip freeze | safety check --stdin -i 70612") + @$(call p, "pip freeze | safety check --stdin -i 70612 -i 73282") + # 70612 - jinja2 - vulnerability requires externally supplied templates + # 73282 - sqlitedict - vulnerability is already managed by via securing access to the database @echo "Done." spelling-add: