Ignore issues
If you do not want to fix a vulnerability or license issue, and don't want to see that issue in scan results, Snyk allows you to ignore it, either temporarily or permanently.

When to ignore issues

Issues can be ignored and viewed via the snyk.io UI, the Snyk APIs, the Snyk CLI, and using the .snyk file.
Ignoring security issues should not be the default action, but it is sometimes necessary. The best practice is to fix or patch vulnerabilities, or to remove the vulnerable dependency, but there may still be reasons why you would want to suppress an issue – for example, if an issue doesn’t currently have a fix, you might want to ignore it until it does.
Some issues are irrelevant for certain projects (e.g. a DDOS attack for an internal service). Other times, an issue has a path that makes it non-exploitable. In these scenarios, you should still fix the issue, as although the vulnerability is not exploitable today, it may be exploitable in future.

Ignoring issues in the UI

Each issue card has an Ignore button that opens up a dialog where you can select why you want to ignore the issue, and how long to ignore it.
If you select Ignore temporarily, then you can check the Until fix is available checkbox:
This will resurface the vulnerability as soon as we have a fix for it, and you can optionally give additional details on why you’re ignoring the issue. This is checked by default if there is currently no fix available for this issue.
An issue is ignored until ANY of the conditions happen - either the ignore period expires, OR the vuln becomes fixable.
When you ignore an issue in our UI, it will show who ignored it and allow you to edit or unignore it.

Ignoring issues in the CLI

Suppressing issues is possible via the CLI using the snyk ignore command.
snyk ignore --id='npm:braces:20180219' --expiry='2018-04-01' --reason='testing'
When you use snyk ignore, the .snyk policy file is updated with the path and reason given, if one was provided. For example:
- moment:
reason: The reason given
expires: '2017-12-29T16:10:16.946Z'

Scanning from the CLI or CI/CD, Ignoring in the UI

Ignores between a CLI (or CI/CD run) and the Snyk UI are synchronized. So the flow is:
  1. 1.
    A project is scanned and pushed to the UI using snyk monitor.
  2. 2.
    You see the results of the scan and choose to ignore an issue.
  3. 3.
    The issue is ignored when running snyk test or snyk monitor in the CI/CD or CLI
For example:
snyk test before ignoring in the UI:
snyk test after ignoring in the UI:
It is important that the above is true if you ignore the project imported by snyk monitor from the CLI or CI/CD.
The same repo imported from the SCM is considered as a different project, and any ignore on an SCM project does not impact the results of a snyk test from a CLI or CI/CD. SCM and CI project behave as two stand alone projects.

Ignoring issues with the .snyk file

For all projects, you can ignore the vulnerability by creating a .snyk YAML file.
For example, if you wanted to ignore the vulnerability with SNYK ID SNYK-RUBY-FASTREADER-20085 in fastreader, with the reason “No fix available” until 01 Jan 2023, you would write:
version v1.5.0
- '* > fastreader':
reason: 'No fix available'
expires '2023-01-01T00:00:00.000Z'
See The .snyk file for more details.

Ignoring issues with policy actions

You can set Security policies actions to ignore all vulnerabilities that match the conditions specified in a policy rule.
See Security policies: Actions for more details.

Ignoring issues in Snyk Code

For Snyk Code, ignore functionality may capture a wider range of issues than other products.
Snyk Code's static code analysis transforms the input code into an intermediate representation, which captures the flow of code, but abstracts away some details. Snyk Code uses this representation to recognize the same issue even when you refactor your code or rename a variable.
So when you ignore an issue, Snyk Code can also ignore that issue if it occurs in multiple places in your code, even with minor code changes. This avoids seeing multiple duplicate reports for pieces of code with the same ignored issue.
As an example, the following two code snippets (despite textual differences) denounce the same issue, as we only renamed the variables:
var fs = require('fs');
var logFileName = req.query.file || 'standard_log.log';
var logfile = fs.readFile(logFileName, "utf8", function(err, data) {...
var filesystem = require('fs');
var generalLogFileName = req.query.file || 'standard_log.log';
var handleLogFile = filesystem.readFile(generalLogFileName, "utf8", function(err, data) {...
See Using Snyk Code via web for more details of Snyk Code.

Ignoring issues in Snyk IaC

When scanning your IaC configuration files using the Snyk CLI with snyk iac test you can ignore issues that are not relevant to you.
You can do this by using The .snyk file, which we recommend is stored and versioned in the root of your working directory for where you store your IaC configuration files.

Set who can configure ignore settings

As suppressing vulnerabilities carries a level of risk, you can make this function available to admins only:
  1. 1.
    Go to your organization settings > General, then navigate in the Ignores section
  2. 2.
    Under Ability to ignore an issue, or edit the ignore settings on an issue, select Admin users only. This also disables ignores from being added via the CLI).
  3. 3.
    Under Require reason for each ignore, you can also choose to set the more details field to be a compulsory field when an issue is being ignored, ensuring the user enters a reason for each ignore.
  4. 4.
    Click Update to make the changes.

Using ignores in reports

If you have access to our Reports feature, you will also be able to see an overview of how many issues in your organization’s projects are ignored, along with an option to filter these so you can drill down into each one. If the issue was ignored in our UI, we include a credit for additional accountability, so you can see who initiated it.
See Reports for more details.