Identified Risks

This table shows all the identified risks for this repository.

Filename
Message
Scanner
public/example-sarif.json
private-key has detected secret for file public/example-sarif.json at commit b3e4c7114cdd47991544bf46743386ba1fde1a0e.
secret-scanning
attestation-resources/deployment.yaml
Minimize the admission of pods which lack an associated NetworkPolicy
iac
attestation-resources/deployment.yaml
CPU limits should be set
iac
attestation-resources/deployment.yaml
Liveness Probe Should be Configured
iac
.github/workflows/licenses.yaml
Ensure top-level permissions are not set to write-all
iac
leaks-baseline.json
private-key has detected secret for file leaks-baseline.json at commit 42a48857d3e06d2f18b0611d7f37cf98627ee4f9.
secret-scanning
/github/workspace/attestation-resources/deployment.yaml
In Kubernetes, each pod runs in its own isolated environment with its own set of security policies. However, certain container images may contain `setuid` or `setgid` binaries that could allow an attacker to perform privilege escalation and gain access to sensitive resources. To mitigate this risk, it's recommended to add a `securityContext` to the container in the pod, with the parameter `allowPrivilegeEscalation` set to `false`. This will prevent the container from running any privileged processes and limit the impact of any potential attacks. By adding a `securityContext` to your Kubernetes pod, you can help to ensure that your containerized applications are more secure and less vulnerable to privilege escalation attacks.
sast
attestation-resources/deployment.yaml
CPU requests should be set
iac
attestation-resources/deployment.yaml
Containers should not run with allowPrivilegeEscalation
iac
attestation-resources/deployment.yaml
Minimize the admission of root containers
iac
attestation-resources/deployment.yaml
Apply security context to your pods and containers
iac
attestation-resources/deployment.yaml
Use read-only filesystem for containers where possible
iac
attestation-resources/deployment.yaml
Containers should run as a high UID to avoid host conflict
iac
attestation-resources/deployment.yaml
Minimize the admission of containers with the NET_RAW capability
iac
attestation-resources/deployment.yaml
Minimize the admission of containers with capabilities assigned
iac
attestation-resources/deployment.yaml
Ensure that Service Account Tokens are only mounted where necessary
iac
attestation-resources/deployment.yaml
Readiness Probe Should be Configured
iac
attestation-resources/deployment.yaml
Apply security context to your containers
iac
attestation-resources/deployment.yaml
Image should use digest
iac
attestation-resources/cosign.key
private-key has detected secret for file attestation-resources/cosign.key at commit 87f606c188edc371acfc2ba587663b958da9a768.
secret-scanning
src/pages/self-hosting-devguard/kubernetes.mdx
generic-api-key has detected secret for file src/pages/self-hosting-devguard/kubernetes.mdx at commit a557af3d6218f7eecde81dd44d6f4cac908a57b7.
secret-scanning
attestation-resources/deployment.yaml
Memory requests should be set
iac
attestation-resources/deployment.yaml
Memory limits should be set
iac
attestation-resources/deployment.yaml
Ensure that the seccomp profile is set to docker/default or runtime/default
iac
Dockerfile
Ensure that HEALTHCHECK instructions have been added to container images
iac

Showing 1 of 2 pages (27 items)

Copyright © 2025 L3montree GmbH and the DevGuard Contributors. All rights reserved. Version 71cda54d19c6900d5d185b8bc7c11608a8a65bac