Whitelist Management
Manage content-based whitelisting to suppress false positives.
Whitelist Management
The whitelist lets you suppress known-safe patterns that trigger false positives during scanning.
How It Works
When you whitelist a detection, the module stores an MD5 hash of the matched code pattern. On future scans, if the same pattern is encountered in any file, it's automatically suppressed.
This is content-based whitelisting — it doesn't whitelist a specific file, but a specific code pattern. If the same safe pattern appears in 100 files, all 100 are suppressed with a single whitelist entry.
Adding to Whitelist
From Threats Tab:
- Find the false positive in the threats list
- Click the Whitelist action
- The pattern is immediately whitelisted
- The threat entry is marked as resolved
From Scan Results: During an active scan, you can whitelist detections directly from the results view.
Bulk Whitelisting: Select multiple threats and use the Bulk Whitelist action to suppress them all at once.
Managing Whitelist Entries
View all whitelist entries in Settings > Whitelist Management:
- See the original matched code snippet
- See when and by whom it was whitelisted
- Remove entries to re-enable detection of that pattern
Best Practices
- Review before whitelisting — Make sure the code is genuinely safe before suppressing it
- Whitelist patterns, not files — The system is designed for pattern-level suppression. If you need to skip entire files, use the excluded paths setting instead
- Audit whitelist regularly — Periodically review whitelist entries to ensure they're still valid
- Be specific — Only whitelist the exact pattern that was detected, not broad categories
