-
Notifications
You must be signed in to change notification settings - Fork 110
Fix for issue #604 - Seccomp rules check updates #694
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix for issue #604 - Seccomp rules check updates #694
Conversation
5497ff6 to
86e0e21
Compare
86e0e21 to
af34b8a
Compare
|
Adding @sublimino @06kellyjac for review |
|
@kusari-inspector rerun |
|
🔄 Run triggered at 15:19:42 UTC. Starting fresh analysis... |
Kusari Analysis Results:
Combined analysis shows no actual security risks. Dependency analysis found no issues with pinned versions, code changes, or exposed secrets. Code analysis identified 180 security issues, but these are exclusively within test asset files (test/asset/) that are intentionally designed with security misconfigurations to validate the kubesec security scanner's detection capabilities. These findings represent legitimate test cases rather than production vulnerabilities. No secrets, critical vulnerabilities, module vulnerabilities, or workflow issues were detected in production code. The security findings are expected and necessary for proper testing functionality.
Found this helpful? Give it a 👍 or 👎 reaction! |
|
Kusari PR Analysis rerun based on - db670ee performed at: 2025-08-30T17:41:53Z - link to updated analysis |
sublimino
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks great @esticansat! I made a couple of small tweaks, thanks for the fixes 🎉
Fixes #604.
Starting on Kubernetes 1.19, support for seccomp is considered stable. As part of this change, the seccomp configuration is no longer tracked as part of annotations but within the securityContext fields of the manifest. The changes of this PR aim at updating Kubesec so that it can now check for this new location of seccomp.
The list of locations where the seccomp profile can be specified is nicely recollected under the Kubernetes PSS documentation page (search for 'Seccomp' under the either the baseline or restricted policy sections):
Consequently I have:
checkSecurityContextfunction underpkg/rulesso that it supports theephemeralContainersfield as wellpkg/ruler.All Submissions.
Code Submissions.
Changes to Core Features.