bug(kubernetes): KSV001 FP #6232
Labels
kind/bug
Categorizes issue or PR as related to a bug.
target/kubernetes
Issues relating to kubernetes cluster scanning
Milestone
The logic of the rule needs to be corrected.
Testcase:
Discussed in #6152
Originally posted by pfrydids February 17, 2024
Description
I have deployed version 2.26.0 of the ebs-csi-node helm chart.
trivy k8s daemonset/ebs-csi-node -n kube-system --compliance=k8s-nsa --report all | grep allowPrivilegeEscalation
results in
Which I think is due to it not differentiating between containers (only 1 container allows privilege escalation).
The net result is a compliance report which is reporting far to many violations.
I have focused on the allowPrivilegeEscalation but I think it applies to many others.
Desired Behavior
The command to return
Actual Behavior
Reproduction Steps
1. create an EKS cluster 2. helm repo add aws-ebs-csi-driver https://kubernetes-sigs.github.io/aws-ebs-csi-driver 3. helm repo update 3. helm upgrade --install aws-ebs-csi-driver \ --namespace kube-system \ aws-ebs-csi-driver/aws-ebs-csi-driver 4. trivy k8s daemonset/ebs-csi-node -n kube-system --compliance=k8s-nsa --report all | grep allowPrivilegeEscalation ...
Target
Kubernetes
Scanner
None
Output Format
None
Mode
None
Debug Output
Operating System
Linux
Version
Checklist
trivy image --reset
The text was updated successfully, but these errors were encountered: