You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -50,6 +66,22 @@ KubeLinter includes the following built-in checks:
50
66
{}
51
67
```
52
68
69
+
## docker-sock
70
+
71
+
**Enabled by default**: Yes
72
+
73
+
**Description**: Alert on deployments with docker.sock mounted in containers.
74
+
75
+
**Remediation**: Ensure the Docker socket is not mounted inside any containers by removing the associated Volume and VolumeMount in deployment yaml specification. If the Docker socket is mounted inside a container it could allow processes running within the container to execute Docker commands which would effectively allow for full control of the host.
@@ -194,6 +290,22 @@ KubeLinter includes the following built-in checks:
194
290
{}
195
291
```
196
292
293
+
## privilege-escalation-container
294
+
295
+
**Enabled by default**: Yes
296
+
297
+
**Description**: Alert on containers of allowing privilege escalation that could gain more privileges than its parent process.
298
+
299
+
**Remediation**: Ensure containers do not allow privilege escalation by setting allowPrivilegeEscalation=false." See https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ for more details.
@@ -274,6 +418,38 @@ KubeLinter includes the following built-in checks:
274
418
{"port":22,"protocol":"TCP"}
275
419
```
276
420
421
+
## unsafe-proc-mount
422
+
423
+
**Enabled by default**: No
424
+
425
+
**Description**: Alert on deployments with unsafe /proc mount (procMount=Unmasked) that will bypass the default masking behavior of the container runtime
426
+
427
+
**Remediation**: Ensure container does not unsafely exposes parts of /proc by setting procMount=Default. Unmasked ProcMount bypasses the default masking behavior of the container runtime. See https://kubernetes.io/docs/concepts/security/pod-security-standards/ for more details.
**Description**: Alert on deployments specifying unsafe sysctls that may lead to severe problems like wrong behavior of containers
442
+
443
+
**Remediation**: Ensure container does not allow unsafe allocation of system resources by removing unsafe sysctls configurations. For more details see https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/https://docs.docker.com/engine/reference/commandline/run/#configure-namespaced-kernel-parameters-sysctls-at-runtime.
0 commit comments