Back to Argo Cd

Snyk test report

docs/snyk/master/argocd-iac-install.html

3.4.027.0 KB
Original Source

| Project | manifests/install.yaml | | Path | /argo-cd/manifests/install.yaml | | Project Type | Kubernetes |

Role or ClusterRole with dangerous permissions

high severity


  • Public ID: SNYK-CC-K8S-47
  • Introduced through: [DocId: 17] › rules[4] › resources
  • Line number: 30947

Impact

Using this role grants dangerous permissions. For a ClusterRole this would be considered high severity.

Remediation

Consider removing these permissions


More about this issue

Role or ClusterRole with dangerous permissions

medium severity


  • Public ID: SNYK-CC-K8S-47
  • Introduced through: [DocId: 10] › rules[0] › resources
  • Line number: 30632

Impact

Using this role grants dangerous permissions. For a ClusterRole this would be considered high severity.

Remediation

Consider removing these permissions


More about this issue

Role or ClusterRole with dangerous permissions

medium severity


  • Public ID: SNYK-CC-K8S-47
  • Introduced through: [DocId: 11] › rules[4] › resources
  • Line number: 30720

Impact

Using this role grants dangerous permissions. For a ClusterRole this would be considered high severity.

Remediation

Consider removing these permissions


More about this issue

Role or ClusterRole with dangerous permissions

medium severity


  • Public ID: SNYK-CC-K8S-47
  • Introduced through: [DocId: 12] › rules[0] › resources
  • Line number: 30755

Impact

Using this role grants dangerous permissions. For a ClusterRole this would be considered high severity.

Remediation

Consider removing these permissions


More about this issue

Role or ClusterRole with dangerous permissions

medium severity


  • Public ID: SNYK-CC-K8S-47
  • Introduced through: [DocId: 13] › rules[1] › resources
  • Line number: 30785

Impact

Using this role grants dangerous permissions. For a ClusterRole this would be considered high severity.

Remediation

Consider removing these permissions


More about this issue

Role or ClusterRole with dangerous permissions

medium severity


  • Public ID: SNYK-CC-K8S-47
  • Introduced through: [DocId: 13] › rules[3] › resources
  • Line number: 30803

Impact

Using this role grants dangerous permissions. For a ClusterRole this would be considered high severity.

Remediation

Consider removing these permissions


More about this issue

Role or ClusterRole with dangerous permissions

medium severity


  • Public ID: SNYK-CC-K8S-47
  • Introduced through: [DocId: 14] › rules[0] › resources
  • Line number: 30821

Impact

Using this role grants dangerous permissions. For a ClusterRole this would be considered high severity.

Remediation

Consider removing these permissions


More about this issue

Role or ClusterRole with dangerous permissions

medium severity


  • Public ID: SNYK-CC-K8S-47
  • Introduced through: [DocId: 15] › rules[0] › resources
  • Line number: 30843

Impact

Using this role grants dangerous permissions. For a ClusterRole this would be considered high severity.

Remediation

Consider removing these permissions


More about this issue

Container could be running with outdated image

low severity


  • Public ID: SNYK-CC-K8S-42
  • Introduced through: [DocId: 48] › spec › template › spec › initContainers[secret-init] › imagePullPolicy
  • Line number: 32104

Impact

The container may run with outdated or unauthorized image

Remediation

Set imagePullPolicy attribute to Always


More about this issue

Container could be running with outdated image

low severity


  • Public ID: SNYK-CC-K8S-42
  • Introduced through: [DocId: 49] › spec › template › spec › initContainers[copyutil] › imagePullPolicy
  • Line number: 32459

Impact

The container may run with outdated or unauthorized image

Remediation

Set imagePullPolicy attribute to Always


More about this issue

Container has no CPU limit

low severity


  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 45] › input › spec › template › spec › containers[argocd-applicationset-controller] › resources › limits › cpu
  • Line number: 31530

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add resources.limits.cpu field with required CPU limit value


More about this issue

Container has no CPU limit

low severity


  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 46] › input › spec › template › spec › initContainers[copyutil] › resources › limits › cpu
  • Line number: 31900

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add resources.limits.cpu field with required CPU limit value


More about this issue

Container has no CPU limit

low severity


  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 46] › input › spec › template › spec › containers[dex] › resources › limits › cpu
  • Line number: 31842

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add resources.limits.cpu field with required CPU limit value


More about this issue

Container has no CPU limit

low severity


  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 47] › input › spec › template › spec › containers[argocd-notifications-controller] › resources › limits › cpu
  • Line number: 31962

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add resources.limits.cpu field with required CPU limit value


More about this issue

Container has no CPU limit

low severity


  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 48] › input › spec › template › spec › containers[redis] › resources › limits › cpu
  • Line number: 32075

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add resources.limits.cpu field with required CPU limit value


More about this issue

Container has no CPU limit

low severity


  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 48] › input › spec › template › spec › initContainers[secret-init] › resources › limits › cpu
  • Line number: 32099

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add resources.limits.cpu field with required CPU limit value


More about this issue

Container has no CPU limit

low severity


  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 49] › input › spec › template › spec › initContainers[copyutil] › resources › limits › cpu
  • Line number: 32459

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add resources.limits.cpu field with required CPU limit value


More about this issue

Container has no CPU limit

low severity


  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 49] › input › spec › template › spec › containers[argocd-repo-server] › resources › limits › cpu
  • Line number: 32158

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add resources.limits.cpu field with required CPU limit value


More about this issue

Container has no CPU limit

low severity


  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 50] › input › spec › template › spec › containers[argocd-server] › resources › limits › cpu
  • Line number: 32554

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add resources.limits.cpu field with required CPU limit value


More about this issue

Container has no CPU limit

low severity


  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 51] › input › spec › template › spec › containers[argocd-application-controller] › resources › limits › cpu
  • Line number: 33012

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add resources.limits.cpu field with required CPU limit value


More about this issue

Container is running with multiple open ports

low severity


  • Public ID: SNYK-CC-K8S-36
  • Introduced through: [DocId: 46] › spec › template › spec › containers[dex] › ports
  • Line number: 31880

Impact

Increases the attack surface of the application and the container.

Remediation

Reduce ports count to 2


More about this issue

Container is running without liveness probe

low severity


  • Public ID: SNYK-CC-K8S-41
  • Introduced through: [DocId: 45] › spec › template › spec › containers[argocd-applicationset-controller] › livenessProbe
  • Line number: 31530

Impact

Kubernetes will not be able to detect if application is able to service requests, and will not restart unhealthy pods

Remediation

Add livenessProbe attribute


More about this issue

Container is running without liveness probe

low severity


  • Public ID: SNYK-CC-K8S-41
  • Introduced through: [DocId: 46] › spec › template › spec › containers[dex] › livenessProbe
  • Line number: 31842

Impact

Kubernetes will not be able to detect if application is able to service requests, and will not restart unhealthy pods

Remediation

Add livenessProbe attribute


More about this issue

Container is running without liveness probe

low severity


  • Public ID: SNYK-CC-K8S-41
  • Introduced through: [DocId: 48] › spec › template › spec › containers[redis] › livenessProbe
  • Line number: 32075

Impact

Kubernetes will not be able to detect if application is able to service requests, and will not restart unhealthy pods

Remediation

Add livenessProbe attribute


More about this issue

Container is running without memory limit

low severity


  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 45] › input › spec › template › spec › containers[argocd-applicationset-controller] › resources › limits › memory
  • Line number: 31530

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set resources.limits.memory value


More about this issue

Container is running without memory limit

low severity


  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 46] › input › spec › template › spec › containers[dex] › resources › limits › memory
  • Line number: 31842

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set resources.limits.memory value


More about this issue

Container is running without memory limit

low severity


  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 46] › input › spec › template › spec › initContainers[copyutil] › resources › limits › memory
  • Line number: 31900

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set resources.limits.memory value


More about this issue

Container is running without memory limit

low severity


  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 47] › input › spec › template › spec › containers[argocd-notifications-controller] › resources › limits › memory
  • Line number: 31962

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set resources.limits.memory value


More about this issue

Container is running without memory limit

low severity


  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 48] › input › spec › template › spec › containers[redis] › resources › limits › memory
  • Line number: 32075

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set resources.limits.memory value


More about this issue

Container is running without memory limit

low severity


  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 48] › input › spec › template › spec › initContainers[secret-init] › resources › limits › memory
  • Line number: 32099

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set resources.limits.memory value


More about this issue

Container is running without memory limit

low severity


  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 49] › input › spec › template › spec › initContainers[copyutil] › resources › limits › memory
  • Line number: 32459

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set resources.limits.memory value


More about this issue

Container is running without memory limit

low severity


  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 49] › input › spec › template › spec › containers[argocd-repo-server] › resources › limits › memory
  • Line number: 32158

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set resources.limits.memory value


More about this issue

Container is running without memory limit

low severity


  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 50] › input › spec › template › spec › containers[argocd-server] › resources › limits › memory
  • Line number: 32554

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set resources.limits.memory value


More about this issue

Container is running without memory limit

low severity


  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 51] › input › spec › template › spec › containers[argocd-application-controller] › resources › limits › memory
  • Line number: 33012

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set resources.limits.memory value


More about this issue

Container's or Pod's UID could clash with host's UID

low severity


  • Public ID: SNYK-CC-K8S-11
  • Introduced through: [DocId: 45] › input › spec › template › spec › containers[argocd-applicationset-controller] › securityContext › runAsUser
  • Line number: 31755

Impact

UID of the container processes could clash with host's UIDs and lead to unintentional authorization bypass

Remediation

Set securityContext.runAsUser value to greater or equal than 10'000. SecurityContext can be set on both pod and container level. If both are set, then the container level takes precedence


More about this issue

Container's or Pod's UID could clash with host's UID

low severity


  • Public ID: SNYK-CC-K8S-11
  • Introduced through: [DocId: 46] › input › spec › template › spec › initContainers[copyutil] › securityContext › runAsUser
  • Line number: 31908

Impact

UID of the container processes could clash with host's UIDs and lead to unintentional authorization bypass

Remediation

Set securityContext.runAsUser value to greater or equal than 10'000. SecurityContext can be set on both pod and container level. If both are set, then the container level takes precedence


More about this issue

Container's or Pod's UID could clash with host's UID

low severity


  • Public ID: SNYK-CC-K8S-11
  • Introduced through: [DocId: 46] › input › spec › template › spec › containers[dex] › securityContext › runAsUser
  • Line number: 31883

Impact

UID of the container processes could clash with host's UIDs and lead to unintentional authorization bypass

Remediation

Set securityContext.runAsUser value to greater or equal than 10'000. SecurityContext can be set on both pod and container level. If both are set, then the container level takes precedence


More about this issue

Container's or Pod's UID could clash with host's UID

low severity


  • Public ID: SNYK-CC-K8S-11
  • Introduced through: [DocId: 47] › input › spec › template › spec › containers[argocd-notifications-controller] › securityContext › runAsUser
  • Line number: 32007

Impact

UID of the container processes could clash with host's UIDs and lead to unintentional authorization bypass

Remediation

Set securityContext.runAsUser value to greater or equal than 10'000. SecurityContext can be set on both pod and container level. If both are set, then the container level takes precedence


More about this issue

Container's or Pod's UID could clash with host's UID

low severity


  • Public ID: SNYK-CC-K8S-11
  • Introduced through: [DocId: 48] › input › spec › template › spec › containers[redis] › securityContext › runAsUser
  • Line number: 32092

Impact

UID of the container processes could clash with host's UIDs and lead to unintentional authorization bypass

Remediation

Set securityContext.runAsUser value to greater or equal than 10'000. SecurityContext can be set on both pod and container level. If both are set, then the container level takes precedence


More about this issue

Container's or Pod's UID could clash with host's UID

low severity


  • Public ID: SNYK-CC-K8S-11
  • Introduced through: [DocId: 48] › input › spec › template › spec › initContainers[secret-init] › securityContext › runAsUser
  • Line number: 32106

Impact

UID of the container processes could clash with host's UIDs and lead to unintentional authorization bypass

Remediation

Set securityContext.runAsUser value to greater or equal than 10'000. SecurityContext can be set on both pod and container level. If both are set, then the container level takes precedence


More about this issue

Container's or Pod's UID could clash with host's UID

low severity


  • Public ID: SNYK-CC-K8S-11
  • Introduced through: [DocId: 49] › input › spec › template › spec › initContainers[copyutil] › securityContext › runAsUser
  • Line number: 32467

Impact

UID of the container processes could clash with host's UIDs and lead to unintentional authorization bypass

Remediation

Set securityContext.runAsUser value to greater or equal than 10'000. SecurityContext can be set on both pod and container level. If both are set, then the container level takes precedence


More about this issue

Container's or Pod's UID could clash with host's UID

low severity


  • Public ID: SNYK-CC-K8S-11
  • Introduced through: [DocId: 49] › input › spec › template › spec › containers[argocd-repo-server] › securityContext › runAsUser
  • Line number: 32432

Impact

UID of the container processes could clash with host's UIDs and lead to unintentional authorization bypass

Remediation

Set securityContext.runAsUser value to greater or equal than 10'000. SecurityContext can be set on both pod and container level. If both are set, then the container level takes precedence


More about this issue

Container's or Pod's UID could clash with host's UID

low severity


  • Public ID: SNYK-CC-K8S-11
  • Introduced through: [DocId: 50] › input › spec › template › spec › containers[argocd-server] › securityContext › runAsUser
  • Line number: 32911

Impact

UID of the container processes could clash with host's UIDs and lead to unintentional authorization bypass

Remediation

Set securityContext.runAsUser value to greater or equal than 10'000. SecurityContext can be set on both pod and container level. If both are set, then the container level takes precedence


More about this issue

Container's or Pod's UID could clash with host's UID

low severity


  • Public ID: SNYK-CC-K8S-11
  • Introduced through: [DocId: 51] › input › spec › template › spec › containers[argocd-application-controller] › securityContext › runAsUser
  • Line number: 33335

Impact

UID of the container processes could clash with host's UIDs and lead to unintentional authorization bypass

Remediation

Set securityContext.runAsUser value to greater or equal than 10'000. SecurityContext can be set on both pod and container level. If both are set, then the container level takes precedence


More about this issue