Customize the detection by ignoring non-relevant vulnerabilities
Policy Breaching
vulnerabilities (that will be highlighted in the IDE and blocking in CI) but also which vulnerabilities to ignore.
Those configurations can be written based on the file path, severity, language, vulnerability id provider or service.