Overview
The suppression system allows you to manage false positives in your AI security workflow. When RAXE detects a threat that you’ve verified as safe, you can suppress it to prevent future alerts.Suppressions should be used sparingly. Before suppressing, verify it’s a true false positive and consider if the detection rule needs updating.
Configuration
Suppressions are configured in.raxe/suppressions.yaml:
Required Fields
| Field | Description |
|---|---|
pattern | Rule ID or wildcard pattern (e.g., pi-001, pi-*) |
reason | Human-readable reason for suppression (required for audit) |
Optional Fields
| Field | Description |
|---|---|
expires | ISO 8601 expiration date |
action | Override action: SUPPRESS, FLAG, or LOG |
created_by | Who created the suppression |
Patterns
Patterns support wildcards with family prefixes:Valid Family Prefixes
| Prefix | Family |
|---|---|
pi | Prompt Injection |
jb | Jailbreak |
pii | PII Leakage |
cmd | Command Injection |
hc | Harmful Content |
enc | Encoding Attacks |
rag | RAG Attacks |
Actions
Instead of fully suppressing a detection, you can override its action:| Action | Behavior |
|---|---|
SUPPRESS | Remove from results entirely (default) |
FLAG | Keep in results but mark for human review |
LOG | Keep in results for metrics/logging only |
SDK Usage
Inline Suppression
Context Manager
CLI Usage
Scan with Suppression
Manage Suppressions
Best Practices
Be Specific
Use exact rule IDs when possible. Avoid broad wildcards.
Set Expirations
Temporary suppressions should have expiration dates.
Document Reasons
Provide clear reasons for audit compliance.
Review Regularly
Schedule quarterly reviews of active suppressions.
Example: Good vs. Bad Reasons
Troubleshooting
Suppression Not Working
- Check pattern syntax:
raxe suppress list - Verify file location:
ls -la .raxe/suppressions.yaml - Check for expiration: Expired suppressions are automatically skipped
Invalid Pattern Error
Ensure patterns have valid family prefixes:Missing Reason Error
All suppressions require a reason field:What’s Next
Policies
Configure enforcement policies
Troubleshooting
Common issues and solutions
