Snyk - Open Source Security

Snyk test report

September 7th 2022, 7:39:56 pm

Scanned the following path:
  • /private/argo-cd/manifests/install.yaml (Kubernetes)
35 total issues
Project manifests/install.yaml
Path /private/argo-cd/manifests/install.yaml
Project Type Kubernetes

Container does not drop all default capabilities

medium severity

  • Public ID: SNYK-CC-K8S-6
  • Introduced through: [DocId: 30] input spec template spec containers[dex] securityContext capabilities drop
  • Line number: 3067

Impact

Containers are running with potentially unnecessary privileges

Remediation

Add `ALL` to `securityContext.capabilities.drop` list, and add only required capabilities in `securityContext.capabilities.add`


Container does not drop all default capabilities

medium severity

  • Public ID: SNYK-CC-K8S-6
  • Introduced through: [DocId: 30] input spec template spec initContainers[copyutil] securityContext capabilities drop
  • Line number: 3077

Impact

Containers are running with potentially unnecessary privileges

Remediation

Add `ALL` to `securityContext.capabilities.drop` list, and add only required capabilities in `securityContext.capabilities.add`


Container does not drop all default capabilities

medium severity

  • Public ID: SNYK-CC-K8S-6
  • Introduced through: [DocId: 31] input spec template spec containers[redis] securityContext capabilities drop
  • Line number: 3130

Impact

Containers are running with potentially unnecessary privileges

Remediation

Add `ALL` to `securityContext.capabilities.drop` list, and add only required capabilities in `securityContext.capabilities.add`


Container does not drop all default capabilities

medium severity

  • Public ID: SNYK-CC-K8S-6
  • Introduced through: [DocId: 32] input spec template spec initContainers[copyutil] securityContext capabilities drop
  • Line number: 3313

Impact

Containers are running with potentially unnecessary privileges

Remediation

Add `ALL` to `securityContext.capabilities.drop` list, and add only required capabilities in `securityContext.capabilities.add`


Container is running without privilege escalation control

medium severity

  • Public ID: SNYK-CC-K8S-9
  • Introduced through: [DocId: 30] input spec template spec initContainers[copyutil] securityContext allowPrivilegeEscalation
  • Line number: 3077

Impact

Processes could elevate current privileges via known vectors, for example SUID binaries

Remediation

Set `securityContext.allowPrivilegeEscalation` to `false`


Container is running without privilege escalation control

medium severity

  • Public ID: SNYK-CC-K8S-9
  • Introduced through: [DocId: 31] input spec template spec containers[redis] securityContext allowPrivilegeEscalation
  • Line number: 3130

Impact

Processes could elevate current privileges via known vectors, for example SUID binaries

Remediation

Set `securityContext.allowPrivilegeEscalation` to `false`


Container is running without privilege escalation control

medium severity

  • Public ID: SNYK-CC-K8S-9
  • Introduced through: [DocId: 32] input spec template spec initContainers[copyutil] securityContext allowPrivilegeEscalation
  • Line number: 3313

Impact

Processes could elevate current privileges via known vectors, for example SUID binaries

Remediation

Set `securityContext.allowPrivilegeEscalation` to `false`


Container is running without root user control

medium severity

  • Public ID: SNYK-CC-K8S-10
  • Introduced through: [DocId: 30] input spec template spec initContainers[copyutil] securityContext runAsNonRoot
  • Line number: 3077

Impact

Container could be running with full administrative privileges

Remediation

Set `securityContext.runAsNonRoot` to `true`


Container is running without root user control

medium severity

  • Public ID: SNYK-CC-K8S-10
  • Introduced through: [DocId: 32] input spec template spec initContainers[copyutil] securityContext runAsNonRoot
  • Line number: 3313

Impact

Container could be running with full administrative privileges

Remediation

Set `securityContext.runAsNonRoot` to `true`


Role with dangerous permissions

medium severity

  • Public ID: SNYK-CC-K8S-47
  • Introduced through: [DocId: 6] role rules[0] resources
  • Line number: 2594

Impact

Using this role grants dangerous permissions

Remediation

Consider removing this permissions


Role with dangerous permissions

medium severity

  • Public ID: SNYK-CC-K8S-47
  • Introduced through: [DocId: 7] role rules[0] resources
  • Line number: 2633

Impact

Using this role grants dangerous permissions

Remediation

Consider removing this permissions


Role with dangerous permissions

medium severity

  • Public ID: SNYK-CC-K8S-47
  • Introduced through: [DocId: 8] role rules[0] resources
  • Line number: 2652

Impact

Using this role grants dangerous permissions

Remediation

Consider removing this permissions


Container could be running with outdated image

low severity

  • Public ID: SNYK-CC-K8S-42
  • Introduced through: [DocId: 32] spec template spec initContainers[copyutil] imagePullPolicy
  • Line number: 3313

Impact

The container may run with outdated or unauthorized image

Remediation

Set `imagePullPolicy` attribute to `Always`


Container has no CPU limit

low severity

  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 30] input spec template spec initContainers[copyutil] resources limits cpu
  • Line number: 3077

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add `resources.limits.cpu` field with required CPU limit value


Container has no CPU limit

low severity

  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 30] input spec template spec containers[dex] resources limits cpu
  • Line number: 3057

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add `resources.limits.cpu` field with required CPU limit value


Container has no CPU limit

low severity

  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 31] input spec template spec containers[redis] resources limits cpu
  • Line number: 3130

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add `resources.limits.cpu` field with required CPU limit value


Container has no CPU limit

low severity

  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 32] input spec template spec initContainers[copyutil] resources limits cpu
  • Line number: 3313

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add `resources.limits.cpu` field with required CPU limit value


Container has no CPU limit

low severity

  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 32] input spec template spec containers[argocd-repo-server] resources limits cpu
  • Line number: 3179

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add `resources.limits.cpu` field with required CPU limit value


Container has no CPU limit

low severity

  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 33] input spec template spec containers[argocd-server] resources limits cpu
  • Line number: 3388

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add `resources.limits.cpu` field with required CPU limit value


Container has no CPU limit

low severity

  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 34] input spec template spec containers[argocd-application-controller] resources limits cpu
  • Line number: 3638

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add `resources.limits.cpu` field with required CPU limit value


Container is running with multiple open ports

low severity

  • Public ID: SNYK-CC-K8S-36
  • Introduced through: [DocId: 30] spec template spec containers[dex] ports
  • Line number: 3064

Impact

Increases the attack surface of the application and the container.

Remediation

Reduce `ports` count to 2


Container is running with writable root filesystem

low severity

  • Public ID: SNYK-CC-K8S-8
  • Introduced through: [DocId: 30] input spec template spec initContainers[copyutil] securityContext readOnlyRootFilesystem
  • Line number: 3077

Impact

Compromised process could abuse writable root filesystem to elevate privileges

Remediation

Set `securityContext.readOnlyRootFilesystem` to `true`


Container is running with writable root filesystem

low severity

  • Public ID: SNYK-CC-K8S-8
  • Introduced through: [DocId: 31] input spec template spec containers[redis] securityContext readOnlyRootFilesystem
  • Line number: 3130

Impact

Compromised process could abuse writable root filesystem to elevate privileges

Remediation

Set `securityContext.readOnlyRootFilesystem` to `true`


Container is running with writable root filesystem

low severity

  • Public ID: SNYK-CC-K8S-8
  • Introduced through: [DocId: 32] input spec template spec initContainers[copyutil] securityContext readOnlyRootFilesystem
  • Line number: 3313

Impact

Compromised process could abuse writable root filesystem to elevate privileges

Remediation

Set `securityContext.readOnlyRootFilesystem` to `true`


Container is running without liveness probe

low severity

  • Public ID: SNYK-CC-K8S-41
  • Introduced through: [DocId: 30] spec template spec containers[dex] livenessProbe
  • Line number: 3057

Impact

Kubernetes will not be able to detect if application is able to service requests, and will not restart unhealthy pods

Remediation

Add `livenessProbe` attribute


Container is running without liveness probe

low severity

  • Public ID: SNYK-CC-K8S-41
  • Introduced through: [DocId: 30] spec template spec initContainers[copyutil] livenessProbe
  • Line number: 3077

Impact

Kubernetes will not be able to detect if application is able to service requests, and will not restart unhealthy pods

Remediation

Add `livenessProbe` attribute


Container is running without liveness probe

low severity

  • Public ID: SNYK-CC-K8S-41
  • Introduced through: [DocId: 31] spec template spec containers[redis] livenessProbe
  • Line number: 3130

Impact

Kubernetes will not be able to detect if application is able to service requests, and will not restart unhealthy pods

Remediation

Add `livenessProbe` attribute


Container is running without liveness probe

low severity

  • Public ID: SNYK-CC-K8S-41
  • Introduced through: [DocId: 32] spec template spec initContainers[copyutil] livenessProbe
  • Line number: 3313

Impact

Kubernetes will not be able to detect if application is able to service requests, and will not restart unhealthy pods

Remediation

Add `livenessProbe` attribute


Container is running without memory limit

low severity

  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 30] input spec template spec containers[dex] resources limits memory
  • Line number: 3057

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set `resources.limits.memory` value


Container is running without memory limit

low severity

  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 30] input spec template spec initContainers[copyutil] resources limits memory
  • Line number: 3077

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set `resources.limits.memory` value


Container is running without memory limit

low severity

  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 31] input spec template spec containers[redis] resources limits memory
  • Line number: 3130

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set `resources.limits.memory` value


Container is running without memory limit

low severity

  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 32] input spec template spec initContainers[copyutil] resources limits memory
  • Line number: 3313

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set `resources.limits.memory` value


Container is running without memory limit

low severity

  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 32] input spec template spec containers[argocd-repo-server] resources limits memory
  • Line number: 3179

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set `resources.limits.memory` value


Container is running without memory limit

low severity

  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 33] input spec template spec containers[argocd-server] resources limits memory
  • Line number: 3388

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set `resources.limits.memory` value


Container is running without memory limit

low severity

  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 34] input spec template spec containers[argocd-application-controller] resources limits memory
  • Line number: 3638

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set `resources.limits.memory` value