Skip to main content

Troubleshooting & FAQ

Centralized solutions for common setup and policy issues.

Quick Diagnosis Table

SymptomLikely CauseFix
Everything marked newMissing baseline mount or CI_EVENT not prMount baseline (e.g. main) and set CI_EVENT=pr
No PR comment postedMissing GITHUB_PR_NR / insufficient token permsProvide required env vars; ensure GITHUB_TOKEN has comment scope
Mixed format combine errorJSON + markdown in same combined groupSee Combining & Grouping; split destination or unify format
Empty PR reportOnly existing selected in changesInclude new / changed change categories
Relationship filter ignoreddependency_tree disabledEnable global.dependency_tree=true in config
Template error with JSONtemplate specified for JSON outputRemove template key for JSON
Unsupported field errorField not in allowed domain listUse canonical field list in Policy System
Validation rule ignoredNested object instead of arrayUse "rules": [ { ... }, { ... } ]
Combined JSON missing dataOne policy produced no diff findingsConfirm diff introduces net-new or remove empty policy from group

Baseline / Diff Issues

Ensure two mounts (baseline + head). In GitHub Actions the action handles this automatically; custom Docker runs must supply both.

CI Environment Variables

Minimal for PR diff posting:

  • CI_EVENT=pr
  • GITHUB_TOKEN
  • GITHUB_PR_NR
  • GITHUB_OWNER, GITHUB_REPO

Without these git destinations are skipped; other outputs still render.

Performance Questions

First run (cold) slower; subsequent warm scans benefit from caching. See Performance & Caching.

JSON Schema Stability

JSON outputs are uniform arrays. Schema additions are backward compatible; removals only in major version releases.

FAQ

Why only diff findings by default?

Focus developers on newly introduced risk and accelerate remediation without backlog noise.

Can I scan full history or entire codebase?

Yes: run a separate branch scan with full mode or toggle an environment flag if supported.

How do I allowlist one CVE?

Add a ne rule on VulnerabilityID or narrow severity rules; document rationale in output comment.

How do I suppress a single finding?

Adjust or refine policy filters (e.g., restrict severity or package name). Granular suppression lists currently not provided (roadmap consideration).

Why no SARIF export?

Prioritizing concise markdown + uniform JSON arrays. SARIF may introduce noise; may be revisited if demand is strong.

Is the JSON schema stable?

Yes—additive changes only (fields appended). Breaking field removals avoided.

How do I post results to an external system?

Use a url destination. All outputs in the combined group must be JSON if any are JSON.

How to block only direct vulnerabilities?

Enable dependency_tree globally and filter Relationship=direct.

How to suppress existing license debt?

Route existing to an issue or JSON file; exclude from PR outputs via changes.

See also: Combining & Grouping, Performance & Caching, Security & Trust Model, Glossary.