Skip to content
Draft
Show file tree
Hide file tree
Changes from 3 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 5 additions & 0 deletions examples/Dockerfile.bad
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
# Intentionally insecure for demo purposes

Check failure

Code scanning / Trivy

Image user should not be 'root' High

Artifact: examples/Dockerfile.bad
Type: dockerfile
Vulnerability DS002
Severity: HIGH
Message: Specify at least 1 USER command in Dockerfile with non-root user as argument
Link: DS002

Check notice

Code scanning / Trivy

No HEALTHCHECK defined Low

Artifact: examples/Dockerfile.bad
Type: dockerfile
Vulnerability DS026
Severity: LOW
Message: Add HEALTHCHECK instruction in your Dockerfile
Link: DS026
FROM node:latest

Check warning

Code scanning / Trivy

':latest' tag used Medium

Artifact: examples/Dockerfile.bad
Type: dockerfile
Vulnerability DS001
Severity: MEDIUM
Message: Specify a tag in the 'FROM' statement for image 'node'
Link: DS001
RUN apt-get update && apt-get install -y curl

Check failure

Code scanning / Trivy

'apt-get' missing '--no-install-recommends' High

Artifact: examples/Dockerfile.bad
Type: dockerfile
Vulnerability DS029
Severity: HIGH
Message: '--no-install-recommends' flag is missed: 'apt-get update && apt-get install -y curl'
Link: DS029
# no USER set, runs as root
# uses :latest tag and extra packages
14 changes: 14 additions & 0 deletions examples/pod-insecure.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
# Intentionally insecure for demo purposes

Check warning

Code scanning / Trivy

Seccomp policies disabled Medium

Artifact: examples/pod-insecure.yaml
Type: kubernetes
Vulnerability KSV104
Severity: MEDIUM
Message: container "app" of pod "insecure-pod" in "default" namespace should specify a seccomp profile
Link: KSV104
apiVersion: v1
kind: Pod
metadata:
name: insecure-pod
spec:
hostNetwork: true
containers:
- name: app
image: nginx:latest
securityContext:
privileged: true
allowPrivilegeEscalation: true
runAsUser: 0

Check failure

Code scanning / Trivy

Access to host network High

Artifact: examples/pod-insecure.yaml
Type: kubernetes
Vulnerability KSV009
Severity: HIGH
Message: Pod 'insecure-pod' should not set 'spec.template.spec.hostNetwork' to true
Link: KSV009

Check warning

Code scanning / Trivy

Can elevate its own privileges Medium

Artifact: examples/pod-insecure.yaml
Type: kubernetes
Vulnerability KSV001
Severity: MEDIUM
Message: Container 'app' of Pod 'insecure-pod' should set 'securityContext.allowPrivilegeEscalation' to false
Link: KSV001

Check notice

Code scanning / Trivy

Default capabilities: some containers do not drop all Low

Artifact: examples/pod-insecure.yaml
Type: kubernetes
Vulnerability KSV003
Severity: LOW
Message: Container 'app' of Pod 'insecure-pod' should add 'ALL' to 'securityContext.capabilities.drop'
Link: KSV003

Check notice

Code scanning / Trivy

CPU not limited Low

Artifact: examples/pod-insecure.yaml
Type: kubernetes
Vulnerability KSV011
Severity: LOW
Message: Container 'app' of Pod 'insecure-pod' should set 'resources.limits.cpu'
Link: KSV011

Check warning

Code scanning / Trivy

Runs as root user Medium

Artifact: examples/pod-insecure.yaml
Type: kubernetes
Vulnerability KSV012
Severity: MEDIUM
Message: Container 'app' of Pod 'insecure-pod' should set 'securityContext.runAsNonRoot' to true
Link: KSV012

Check warning

Code scanning / Trivy

Image tag ":latest" used Medium

Artifact: examples/pod-insecure.yaml
Type: kubernetes
Vulnerability KSV013
Severity: MEDIUM
Message: Container 'app' of Pod 'insecure-pod' should specify an image tag
Link: KSV013

Check failure

Code scanning / Trivy

Root file system is not read-only High

Artifact: examples/pod-insecure.yaml
Type: kubernetes
Vulnerability KSV014
Severity: HIGH
Message: Container 'app' of Pod 'insecure-pod' should set 'securityContext.readOnlyRootFilesystem' to true
Link: KSV014

Check notice

Code scanning / Trivy

CPU requests not specified Low

Artifact: examples/pod-insecure.yaml
Type: kubernetes
Vulnerability KSV015
Severity: LOW
Message: Container 'app' of Pod 'insecure-pod' should set 'resources.requests.cpu'
Link: KSV015

Check notice

Code scanning / Trivy

Memory requests not specified Low

Artifact: examples/pod-insecure.yaml
Type: kubernetes
Vulnerability KSV016
Severity: LOW
Message: Container 'app' of Pod 'insecure-pod' should set 'resources.requests.memory'
Link: KSV016

Check failure

Code scanning / Trivy

Privileged High

Artifact: examples/pod-insecure.yaml
Type: kubernetes
Vulnerability KSV017
Severity: HIGH
Message: Container 'app' of Pod 'insecure-pod' should set 'securityContext.privileged' to false
Link: KSV017

Check notice

Code scanning / Trivy

Memory not limited Low

Artifact: examples/pod-insecure.yaml
Type: kubernetes
Vulnerability KSV018
Severity: LOW
Message: Container 'app' of Pod 'insecure-pod' should set 'resources.limits.memory'
Link: KSV018

Check notice

Code scanning / Trivy

Runs with UID <= 10000 Low

Artifact: examples/pod-insecure.yaml
Type: kubernetes
Vulnerability KSV020
Severity: LOW
Message: Container 'app' of Pod 'insecure-pod' should set 'securityContext.runAsUser' > 10000
Link: KSV020

Check notice

Code scanning / Trivy

Runs with GID <= 10000 Low

Artifact: examples/pod-insecure.yaml
Type: kubernetes
Vulnerability KSV021
Severity: LOW
Message: Container 'app' of Pod 'insecure-pod' should set 'securityContext.runAsGroup' > 10000
Link: KSV021

Check notice

Code scanning / Trivy

Runtime/Default Seccomp profile not set Low

Artifact: examples/pod-insecure.yaml
Type: kubernetes
Vulnerability KSV030
Severity: LOW
Message: Either Pod or Container should set 'securityContext.seccompProfile.type' to 'RuntimeDefault'
Link: KSV030

Check notice

Code scanning / Trivy

Container capabilities must only include NET_BIND_SERVICE Low

Artifact: examples/pod-insecure.yaml
Type: kubernetes
Vulnerability KSV106
Severity: LOW
Message: container should drop all
Link: KSV106

Check notice

Code scanning / Trivy

Containers must not set runAsUser to 0 Low

Artifact: examples/pod-insecure.yaml
Type: kubernetes
Vulnerability KSV105
Severity: LOW
Message: securityContext.runAsUser should be set to a value greater than 0
Link: KSV105
Loading