# .llm-security-ignore — Suppress expected findings when scanning this plugin
#
# Why 150 suppressed findings? A security plugin that documents attack patterns,
# ships a malicious demo fixture, and tests against deliberately evil code will
# trigger its own scanners. This is the "scanning the scanner" paradox:
#
# - examples/ contains an intentionally malicious plugin (the demo)
# - knowledge/ documents real attack regex patterns and example URLs
# - tests/ contain deliberate taint flows and suspicious URLs as test input
# - hooks/ and scanners/ contain high-entropy regex for secret detection
#
# Every suppression below is explained. Run without this file to see all 150.
#
# Format: SCANNER:glob or just glob (applies to all scanners)
# Scanners: UNI, ENT, PRM, DEP, TNT, GIT, NET, TFA

# Demo fixture: intentionally malicious (the whole point of the demo)
examples/**

# Test files contain deliberate malicious patterns as test input
TNT:tests/**
NET:tests/**

# Knowledge base documents attack patterns with example URLs and regex
ENT:knowledge/**
NET:knowledge/**

# Hook scripts contain high-entropy regex patterns and log strings
ENT:hooks/**

# Scanner code contains regex patterns that trigger entropy detection
ENT:scanners/**

# Injection patterns module contains injection keywords (by design)
TNT:scanners/lib/injection-patterns.mjs

# Command files contain long prompt strings
ENT:commands/**

# Permission findings: clean needs write tools (by design), deep-scan uses Bash
PRM:commands/**
PRM:agents/**

# Git findings: subtree split artifacts and commit message heuristics
GIT:**

# Network: README references to OWASP, Anthropic, research papers
NET:README.md

# Network: agent docs reference example domains for documentation
NET:agents/**

# Network: supply-chain hook legitimately contacts osv.dev and socket.dev
NET:hooks/**

# Orchestrator legitimately writes log file from argv path
TNT:scanners/scan-orchestrator.mjs

# Toxic flow: plugin commands/agents have Read+Bash access by design (it's a security scanner)
TFA:commands/**
TFA:agents/**

# Network: CLAUDE.md references public repo URL
NET:CLAUDE.md

# Baseline files: generated JSON with scan results (high entropy expected)
reports/baselines/**
