FAQ-000377 - Code Removal and Vulnerability Persistence / Scan Report Discrepancies

Current Status:VALID_RESPONSEErrorUnable to AnswerSuggests Case

Current FAQ

Question
What should I do if I believe I have already implemented a fix but the issue is still being flagged, or if my package failed for issues I've already addressed?
Answer
If you believe you have already implemented a fix but the issue is still being flagged: 1. **Document as False Positive**: Document the issue as a false positive, which happens when a security-scanning tool or code reviewer flags code that seems to pose a security vulnerability but does not. 2. **Provide Evidence**: Submit updated scan reports from tools like the Salesforce Code Analyzer and Source Code Scanner to show that the issues have been addressed. 3. **Include Detailed Documentation**: Prepare and upload a false-positives report with detailed explanations of why the flagged issue is a false positive and evidence of your fixes. 4. **Document the Changes**: Clearly document the changes you made to address the issue. 5. **Submit for Review**: Use the AppExchange Partner Console to submit the revised package along with the supporting documentation for a follow-up review. 6. **Seek Clarification if Needed**: Consider scheduling a technical office hours appointment with the Product Security team if you need further assistance. 7. **Verify Complete Removal**: Double-check that any code removal was implemented correctly and that no residual or related code remains. There is no fee for evaluating false positives, and this process helps ensure that legitimate fixes are properly recognized.
Enhancing FAQ...

Enhancing FAQ with AI recommendations...

AI Recommended Enhancement

Question
What should I do if I believe I have already implemented a fix but the issue is still being flagged, or if my package failed for issues I've already addressed?
Recommended Answer Update
If you believe you've already implemented a fix but the issue is still being flagged: 1. **Document as False Positive**: Document the issue as a false positive, which happens when a security-scanning tool or code reviewer flags code that appears to pose a security vulnerability but doesn't. 2. **Provide Evidence**: Submit updated scan reports from tools like the Salesforce Code Analyzer and Source Code Scanner to show that the issues have been addressed. 3. **Include Detailed Documentation**: Prepare and upload a false-positives report with detailed explanations of why the flagged issue is a false positive and evidence of your fixes. 4. **Document the Changes**: Clearly document the changes you made to address the issue. 5. **Submit for Review**: Use the AppExchange Partner Console to submit the revised package along with the supporting documentation for a follow-up review. 6. **Seek Clarification if Needed**: Consider scheduling a technical office hours appointment with the Product Security team if you need further assistance. 7. **Verify Complete Removal**: Double-check that any code removal was implemented correctly and that no residual or related code remains. There's no fee for evaluating false positives, and this process helps ensure that legitimate fixes are properly recognized.
Reasoning
The FAQ content is accurate and comprehensive but had minor improvements needed for tone and clarity. I made the following refinements: 1) Simplified the opening phrase from 'If you believe you have already implemented a fix but the issue is still being flagged:' to 'If you believe you've already implemented a fix but the issue is still being flagged:' to use more conversational contractions as recommended in the tone guidelines. 2) In step 1, changed 'seems to pose' to 'appears to pose' for slightly more professional language while maintaining clarity. 3) In the final paragraph, changed 'There is no fee' to the more conversational 'There's no fee' using contractions. These changes align with the brand voice guidelines to be more conversational while maintaining the helpful and direct tone. No security rules were selected because this FAQ is procedural guidance about the security review process itself rather than technical content about implementing security measures in code. The FAQ discusses the administrative process of handling false positives in security scans, not the technical implementation of security controls that would trigger specific security rules.