Configuration
Dashboard defaults, repo overrides, frozen snapshots. Configure once, override per-repo when needed, and trust that mid-run edits never touch the active scan.
How configuration is resolved
At trigger time, Infiniview merges your dashboard defaults with the repo’s .infiniview.yml, then freezes the result for the run. Repo config wins for overlapping fields.
- Read the user’s saved dashboard configuration as the base.
- If
.infiniview.ymlexists at repo root, deep-merge it on top. - Persist the merged snapshot on the scan run — that snapshot governs the active scan.
Dashboard configuration
Lives under Security. Controls which scanners and runtime agents run, the severity threshold, exclusion lists, and the runtime budget.
| Setting | What it controls |
|---|---|
| Enabled / disabled scanners | Which static, dependency, secret, and IaC scanners run. |
| Severity threshold | Minimum severity persisted to findings (low / medium / high / critical). |
| Exclude paths | Glob patterns suppressed before scanners process files. |
| Exclude rules | Specific rule IDs ignored across enabled scanners. |
| Runtime agents | Which agents run during sandbox execution. See Scanners & agents. |
| Max plans | Cap on planning iterations per agent. |
| Wall-clock / per-agent timeout | Hard time budget for the run and for each agent. |
| Evidence detail | How much replay context is persisted per finding (summary or full). |
GET /api/scan-config
PUT /api/scan-config # update dashboard defaults
GET /api/settings
PUT /api/settingsRepo configuration (.infiniview.yml)
Add .infiniview.yml at the repo root for security scanner, threshold, exclusion, runtime-agent, timeout, plan, and evidence-detail overrides. Repo config wins for overlapping fields.
version: 1
security:
scanners:
enabled:
- semgrep
- trivy
- gitleaks
disabled:
- bandit
semgrep:
custom_rules: "security/rules"
severity_threshold: medium
exclude_paths:
- "test/**"
- "docs/**"
exclude_rules:
- "generic.secrets.security.detected-generic-secret"
runtime:
enabled_agents:
- api-fuzzer
- injection-tester
- auth-attacker
max_plans: 20
wall_clock_timeout: 600000
per_agent_timeout: 300000
evidence_detail: summaryRepo secrets
Configure encrypted secrets under Settings > Environment Secrets (or persist new env vars from the scan launcher). Values are encrypted at rest and decrypted server-side only when injected into the sandbox at scan time.
GET /api/repo-secrets
POST /api/repo-secrets
DELETE /api/repo-secrets/{id}Validating .infiniview.yml
Use the validation endpoint to check a repo config before it’s committed. The endpoint returns parse errors, unknown keys, and any threshold or scanner-name violations.
POST /api/validate-infiniview-yml