All | Failed | Skipped |
---|---|---|
17 | 1 | 0 |
Severity | Control Name | Failed Resources | All Resources | Risk Score, % |
---|---|---|---|---|
High | Applications credentials in configuration files | 2 | 13 | 15 |
High | CVE-2021-25742-nginx-ingress-snippet-annotation-vulnerability | 0 | 0 | 0 |
High | HostPath mount | 0 | 13 | 0 |
High | List Kubernetes secrets | 0 | 0 | 0 |
High | Privileged container | 0 | 13 | 0 |
High | Writable hostPath mount | 0 | 13 | 0 |
Medium | Access container service account | 0 | 0 | 0 |
Medium | Administrative Roles | 0 | 0 | 0 |
Medium | Cluster internal networking | 0 | 0 | 0 |
Medium | CoreDNS poisoning | 0 | 0 | 0 |
Medium | Delete Kubernetes events | 0 | 0 | 0 |
Medium | Mount service principal | 0 | 13 | 0 |
Medium | Prevent containers from allowing command execution | 0 | 0 | 0 |
Medium | Roles with delete capabilities | 0 | 0 | 0 |
Low | Access Kubernetes dashboard | 0 | 13 | 0 |
Low | PSP enabled | 0 | 0 | 0 |
Low | SSH server running inside container | 0 | 0 | 0 |
ApiVersion: apps/v1
Kind: Deployment
Name: -pathling-server
Namespace:
Severity | Name | Docs | Assisted Remediation |
---|---|---|---|
High | Applications credentials in configuration files | C-0012 | spec.template.spec.containers[0].env[3].name spec.template.spec.containers[0].env[3].value |
ApiVersion: apps/v1
Kind: Deployment
Name: -minio
Namespace:
Severity | Name | Docs | Assisted Remediation |
---|---|---|---|
High | Applications credentials in configuration files | C-0012 | spec.template.spec.containers[0].env[2].name spec.template.spec.containers[0].env[2].value |