-
Notifications
You must be signed in to change notification settings - Fork 230
Seccomp example - Example in Templates Folder #47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
DryRun Security SummaryThis pull request updates the version numbers for an "intentionally insecure" Helm chart, introduces a Seccomp profile for the "insecure-app" container, and includes changes to sensitive environment variables and the mounting of the Docker socket, which require careful review to ensure no new vulnerabilities or insecure configurations have been introduced. Expand for full summarySummary: This pull request updates the version numbers for an "intentionally insecure" Helm chart, which is likely used for testing and evaluation purposes rather than production deployments. While version updates are common, it's crucial to review the changes carefully in the context of an intentionally insecure application to ensure that no new vulnerabilities or insecure configurations have been introduced. Additionally, the pull request includes changes to the Seccomp (Secure Computing) profile for the "insecure-app" container. While the use of a Seccomp profile is a security improvement over running the container in privileged mode, the current profile appears to be quite permissive and lacks the level of security hardening that would be expected for a production-ready application. The pull request also introduces sensitive environment variables and mounts the Docker socket, which could potentially lead to security risks if not properly managed. Files Changed:
As an application security engineer, I would recommend thoroughly reviewing the changes, ensuring that the Seccomp profile is properly configured to restrict the container's access to only the necessary system calls, securing the sensitive environment variables, and carefully evaluating the necessity of mounting the Docker socket. Regular security audits and implementing the principle of least privilege are also crucial to maintain the application's security posture. Code AnalysisWe ran
Riskiness🟢 Risk threshold not exceeded. |
|
Removed dependencies detected. Learn more about Socket for GitHub ↗︎ 🚮 Removed packages: npm/@aikidosec/[email protected], npm/@babel/[email protected], npm/[email protected], npm/[email protected] |
|
👍 Dependency issues cleared. Learn more about Socket for GitHub ↗︎ This PR previously contained dependency changes with security issues that have been resolved, removed, or ignored. |
|
New Issues
Fixed Issues
|





Example of deploying a seccomp profile with least privilege, policies generated with ARMO. Templates folder has examples