Relevant XKCD:

Hi there, I'm curious about what the path.include?("/.") check in safe_local_report_path is for. The reason I ask is because I'm currently populating the output into a JSON file located at REPO_PATH/.salus/salus.json, which triggers this condition.
Could the pattern be updated to "/..", which is less likely to be valid (I can submit a PR if so)?