-
Notifications
You must be signed in to change notification settings - Fork 151
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
improve security Deployment Workload #2347
Comments
Hi @kaz-33 these are all more theoretical linter findings rather than something which would really improve the security here.
Code for the lurker container and how it's started is here: https://github.com/secureCodeBox/secureCodeBox/blob/main/operator/controllers/execution/scans/scan_reconciler.go#L292 |
thx for your response, and what about the service? |
The service was initally auto generated and then never acutally used / properly configured can & should be deleted. (And the related resources in the helm chart (anything with But I don't quit see why the tool marks this as a critical (security) issue. But still help ful to mark this out to be aware of this unnecessary service / config. |
in additionnal security info:
Force the container to run with user ID > 10000 to avoid conflicts with the host’s user table. (thx aquasec)
service-targets-pod Service Makes sure that all Services targets a Pod (Thx Kube-score) |
➹ New Feature implementation request
I run kube-score to see the workload security level deployment. I fix some issue by values file or patchs.
But still some security issue.
Could you integrate this values on the values file.?
Is your feature request related to a problem?
Describe the solution you'd like
exemple:
same for parser.
Describe alternatives you've considered
Additional context
The text was updated successfully, but these errors were encountered: