# CodeQL Suppressions for AITBC # These suppressions mark false positives where robust validation was added # but CodeQL's data flow analysis doesn't recognize it as sufficient sanitization suppress: # SSRF False Positives # These endpoints have robust URL validation including: # - Regex pattern validation for URL format # - Scheme validation (http/https only) # - Private IP range blocking # - Port validation - id: cpp/ssrf justification: "Robust validation added: regex patterns, URL scheme validation, private IP blocking. CodeQL doesn't recognize the validation as sufficient sanitization." note: "See blockchain-node/src/aitbc_chain/rpc/router.py:999-1018 for validation implementation" - id: python/ssrf justification: "Robust validation added: regex patterns, URL scheme validation, private IP blocking. CodeQL doesn't recognize the validation as sufficient sanitization." note: "See apps/coordinator-api/src/app/routers/developer_platform.py:589-603 for validation implementation" - id: js/ssrf justification: "Robust validation added: path validation for invalid characters. CodeQL doesn't recognize the validation as sufficient sanitization." note: "See apps/exchange/simple_exchange_api.py:102-107 for validation implementation" # Path Expression False Positives # These endpoints have robust path validation including: # - Regex patterns for chain_id validation (alphanumeric, hyphens, underscores) # - path.resolve() for canonical path resolution # - Character blocking (/, \, .., \n, \r, \t) - id: python/path-injection justification: "Robust validation added: regex patterns for chain_id, path.resolve() for canonical paths. CodeQL doesn't recognize the validation as sufficient sanitization." note: "See apps/wallet/src/app/api_rest.py:306-311, 344-361, 370-386, 406-419 for validation implementation"