Using our configuration file you can tailor the detection to your context and focus on what’s important to remediate. It allows you to define Policy Breaching vulnerabilities (that will be highlighted in the IDE and blocking in CI) but also which vulnerabilities to ignore. Those configurations can be written based on the file path, severity, language, vulnerability id provider or service. To be taken into account the YAML file must be named symbiotic.yml and placed at the root of the repository. Here are some templates of configuration file, you can use to start :
# SYMBIOTIC SECURITY CONFIGURATION FILE
ignored:
	vulnerabilities:
		#ID of vulnerabilities you want to ignore in the repository
		- SYM_PY_001
		- SYM_JSTS_003# SYMBIOTIC SECURITY CONFIGURATION FILE