As part of examining the codebase for vulnerabilities, Snyk may automatically execute code on your computer to obtain additional data for analysis. This includes invoking the package manager (for example, pip, Gradle, Maven, Yarn, npm, and so on) to get dependency information for Snyk Open Source. Invoking these programs on untrusted code that has malicious configurations may expose your system to malicious code execution and exploits.
To safeguard against using the extension on untrusted projects, the Snyk extension asks for project trust before allowing you to run any scans against your code. When in doubt, do not proceed with a scan.
Once a single project trust is granted, Snyk will not ask for trust on the opened project folder and its subfolders again. To revoke an existing folder trust, manually edit the
TRUSTED_PATHS option in the
snyk.settings.xml located in the JetBrains IDE configuration options directory.
Snyk recommends using the built-in Trusted Projects provided in IntelliJ platform version 2021.2.4/2021.3.1 and higher for an extra layer of security.