Whitelist Management

Manage content-based whitelisting to suppress false positives.

Whitelist Management

The whitelist lets you suppress known-safe patterns that trigger false positives during scanning.

How It Works

When you whitelist a detection, the module stores an MD5 hash of the matched code pattern. On future scans, if the same pattern is encountered in any file, it's automatically suppressed.

This is content-based whitelisting — it doesn't whitelist a specific file, but a specific code pattern. If the same safe pattern appears in 100 files, all 100 are suppressed with a single whitelist entry.

Adding to Whitelist

From Threats Tab:

  1. Find the false positive in the threats list
  2. Click the Whitelist action
  3. The pattern is immediately whitelisted
  4. The threat entry is marked as resolved

From Scan Results: During an active scan, you can whitelist detections directly from the results view.

Bulk Whitelisting: Select multiple threats and use the Bulk Whitelist action to suppress them all at once.

Managing Whitelist Entries

View all whitelist entries in Settings > Whitelist Management:

  • See the original matched code snippet
  • See when and by whom it was whitelisted
  • Remove entries to re-enable detection of that pattern

Best Practices

  1. Review before whitelisting — Make sure the code is genuinely safe before suppressing it
  2. Whitelist patterns, not files — The system is designed for pattern-level suppression. If you need to skip entire files, use the excluded paths setting instead
  3. Audit whitelist regularly — Periodically review whitelist entries to ensure they're still valid
  4. Be specific — Only whitelist the exact pattern that was detected, not broad categories