Back to Argo Cd

Snyk test report

docs/snyk/v3.3.2/argocd-iac-install.html

3.4.027.0 KB
Original Source

| Project | manifests/install.yaml | | Path | /argo-cd/manifests/install.yaml | | Project Type | Kubernetes |

Role or ClusterRole with dangerous permissions

high severity


  • Public ID: SNYK-CC-K8S-47
  • Introduced through: [DocId: 17] › rules[4] › resources
  • Line number: 30936

Impact

Using this role grants dangerous permissions. For a ClusterRole this would be considered high severity.

Remediation

Consider removing these permissions


More about this issue

Role or ClusterRole with dangerous permissions

medium severity


  • Public ID: SNYK-CC-K8S-47
  • Introduced through: [DocId: 10] › rules[0] › resources
  • Line number: 30621

Impact

Using this role grants dangerous permissions. For a ClusterRole this would be considered high severity.

Remediation

Consider removing these permissions


More about this issue

Role or ClusterRole with dangerous permissions

medium severity


  • Public ID: SNYK-CC-K8S-47
  • Introduced through: [DocId: 11] › rules[4] › resources
  • Line number: 30709

Impact

Using this role grants dangerous permissions. For a ClusterRole this would be considered high severity.

Remediation

Consider removing these permissions


More about this issue

Role or ClusterRole with dangerous permissions

medium severity


  • Public ID: SNYK-CC-K8S-47
  • Introduced through: [DocId: 12] › rules[0] › resources
  • Line number: 30744

Impact

Using this role grants dangerous permissions. For a ClusterRole this would be considered high severity.

Remediation

Consider removing these permissions


More about this issue

Role or ClusterRole with dangerous permissions

medium severity


  • Public ID: SNYK-CC-K8S-47
  • Introduced through: [DocId: 13] › rules[1] › resources
  • Line number: 30774

Impact

Using this role grants dangerous permissions. For a ClusterRole this would be considered high severity.

Remediation

Consider removing these permissions


More about this issue

Role or ClusterRole with dangerous permissions

medium severity


  • Public ID: SNYK-CC-K8S-47
  • Introduced through: [DocId: 13] › rules[3] › resources
  • Line number: 30792

Impact

Using this role grants dangerous permissions. For a ClusterRole this would be considered high severity.

Remediation

Consider removing these permissions


More about this issue

Role or ClusterRole with dangerous permissions

medium severity


  • Public ID: SNYK-CC-K8S-47
  • Introduced through: [DocId: 14] › rules[0] › resources
  • Line number: 30810

Impact

Using this role grants dangerous permissions. For a ClusterRole this would be considered high severity.

Remediation

Consider removing these permissions


More about this issue

Role or ClusterRole with dangerous permissions

medium severity


  • Public ID: SNYK-CC-K8S-47
  • Introduced through: [DocId: 15] › rules[0] › resources
  • Line number: 30832

Impact

Using this role grants dangerous permissions. For a ClusterRole this would be considered high severity.

Remediation

Consider removing these permissions


More about this issue

Container could be running with outdated image

low severity


  • Public ID: SNYK-CC-K8S-42
  • Introduced through: [DocId: 48] › spec › template › spec › initContainers[secret-init] › imagePullPolicy
  • Line number: 32039

Impact

The container may run with outdated or unauthorized image

Remediation

Set imagePullPolicy attribute to Always


More about this issue

Container could be running with outdated image

low severity


  • Public ID: SNYK-CC-K8S-42
  • Introduced through: [DocId: 49] › spec › template › spec › initContainers[copyutil] › imagePullPolicy
  • Line number: 32382

Impact

The container may run with outdated or unauthorized image

Remediation

Set imagePullPolicy attribute to Always


More about this issue

Container has no CPU limit

low severity


  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 45] › input › spec › template › spec › containers[argocd-applicationset-controller] › resources › limits › cpu
  • Line number: 31519

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add resources.limits.cpu field with required CPU limit value


More about this issue

Container has no CPU limit

low severity


  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 46] › input › spec › template › spec › initContainers[copyutil] › resources › limits › cpu
  • Line number: 31835

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add resources.limits.cpu field with required CPU limit value


More about this issue

Container has no CPU limit

low severity


  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 46] › input › spec › template › spec › containers[dex] › resources › limits › cpu
  • Line number: 31783

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add resources.limits.cpu field with required CPU limit value


More about this issue

Container has no CPU limit

low severity


  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 47] › input › spec › template › spec › containers[argocd-notifications-controller] › resources › limits › cpu
  • Line number: 31897

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add resources.limits.cpu field with required CPU limit value


More about this issue

Container has no CPU limit

low severity


  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 48] › input › spec › template › spec › containers[redis] › resources › limits › cpu
  • Line number: 32010

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add resources.limits.cpu field with required CPU limit value


More about this issue

Container has no CPU limit

low severity


  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 48] › input › spec › template › spec › initContainers[secret-init] › resources › limits › cpu
  • Line number: 32034

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add resources.limits.cpu field with required CPU limit value


More about this issue

Container has no CPU limit

low severity


  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 49] › input › spec › template › spec › initContainers[copyutil] › resources › limits › cpu
  • Line number: 32382

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add resources.limits.cpu field with required CPU limit value


More about this issue

Container has no CPU limit

low severity


  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 49] › input › spec › template › spec › containers[argocd-repo-server] › resources › limits › cpu
  • Line number: 32093

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add resources.limits.cpu field with required CPU limit value


More about this issue

Container has no CPU limit

low severity


  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 50] › input › spec › template › spec › containers[argocd-server] › resources › limits › cpu
  • Line number: 32470

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add resources.limits.cpu field with required CPU limit value


More about this issue

Container has no CPU limit

low severity


  • Public ID: SNYK-CC-K8S-5
  • Introduced through: [DocId: 51] › input › spec › template › spec › containers[argocd-application-controller] › resources › limits › cpu
  • Line number: 32880

Impact

CPU limits can prevent containers from consuming valuable compute time for no benefit (e.g. inefficient code) that might lead to unnecessary costs. It is advisable to also configure CPU requests to ensure application stability.

Remediation

Add resources.limits.cpu field with required CPU limit value


More about this issue

Container is running with multiple open ports

low severity


  • Public ID: SNYK-CC-K8S-36
  • Introduced through: [DocId: 46] › spec › template › spec › containers[dex] › ports
  • Line number: 31815

Impact

Increases the attack surface of the application and the container.

Remediation

Reduce ports count to 2


More about this issue

Container is running without liveness probe

low severity


  • Public ID: SNYK-CC-K8S-41
  • Introduced through: [DocId: 45] › spec › template › spec › containers[argocd-applicationset-controller] › livenessProbe
  • Line number: 31519

Impact

Kubernetes will not be able to detect if application is able to service requests, and will not restart unhealthy pods

Remediation

Add livenessProbe attribute


More about this issue

Container is running without liveness probe

low severity


  • Public ID: SNYK-CC-K8S-41
  • Introduced through: [DocId: 46] › spec › template › spec › containers[dex] › livenessProbe
  • Line number: 31783

Impact

Kubernetes will not be able to detect if application is able to service requests, and will not restart unhealthy pods

Remediation

Add livenessProbe attribute


More about this issue

Container is running without liveness probe

low severity


  • Public ID: SNYK-CC-K8S-41
  • Introduced through: [DocId: 48] › spec › template › spec › containers[redis] › livenessProbe
  • Line number: 32010

Impact

Kubernetes will not be able to detect if application is able to service requests, and will not restart unhealthy pods

Remediation

Add livenessProbe attribute


More about this issue

Container is running without memory limit

low severity


  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 45] › input › spec › template › spec › containers[argocd-applicationset-controller] › resources › limits › memory
  • Line number: 31519

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set resources.limits.memory value


More about this issue

Container is running without memory limit

low severity


  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 46] › input › spec › template › spec › containers[dex] › resources › limits › memory
  • Line number: 31783

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set resources.limits.memory value


More about this issue

Container is running without memory limit

low severity


  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 46] › input › spec › template › spec › initContainers[copyutil] › resources › limits › memory
  • Line number: 31835

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set resources.limits.memory value


More about this issue

Container is running without memory limit

low severity


  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 47] › input › spec › template › spec › containers[argocd-notifications-controller] › resources › limits › memory
  • Line number: 31897

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set resources.limits.memory value


More about this issue

Container is running without memory limit

low severity


  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 48] › input › spec › template › spec › containers[redis] › resources › limits › memory
  • Line number: 32010

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set resources.limits.memory value


More about this issue

Container is running without memory limit

low severity


  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 48] › input › spec › template › spec › initContainers[secret-init] › resources › limits › memory
  • Line number: 32034

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set resources.limits.memory value


More about this issue

Container is running without memory limit

low severity


  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 49] › input › spec › template › spec › initContainers[copyutil] › resources › limits › memory
  • Line number: 32382

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set resources.limits.memory value


More about this issue

Container is running without memory limit

low severity


  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 49] › input › spec › template › spec › containers[argocd-repo-server] › resources › limits › memory
  • Line number: 32093

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set resources.limits.memory value


More about this issue

Container is running without memory limit

low severity


  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 50] › input › spec › template › spec › containers[argocd-server] › resources › limits › memory
  • Line number: 32470

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set resources.limits.memory value


More about this issue

Container is running without memory limit

low severity


  • Public ID: SNYK-CC-K8S-4
  • Introduced through: [DocId: 51] › input › spec › template › spec › containers[argocd-application-controller] › resources › limits › memory
  • Line number: 32880

Impact

Containers without memory limits are more likely to be terminated when the node runs out of memory

Remediation

Set resources.limits.memory value


More about this issue

Container's or Pod's UID could clash with host's UID

low severity


  • Public ID: SNYK-CC-K8S-11
  • Introduced through: [DocId: 45] › input › spec › template › spec › containers[argocd-applicationset-controller] › securityContext › runAsUser
  • Line number: 31696

Impact

UID of the container processes could clash with host's UIDs and lead to unintentional authorization bypass

Remediation

Set securityContext.runAsUser value to greater or equal than 10'000. SecurityContext can be set on both pod and container level. If both are set, then the container level takes precedence


More about this issue

Container's or Pod's UID could clash with host's UID

low severity


  • Public ID: SNYK-CC-K8S-11
  • Introduced through: [DocId: 46] › input › spec › template › spec › initContainers[copyutil] › securityContext › runAsUser
  • Line number: 31843

Impact

UID of the container processes could clash with host's UIDs and lead to unintentional authorization bypass

Remediation

Set securityContext.runAsUser value to greater or equal than 10'000. SecurityContext can be set on both pod and container level. If both are set, then the container level takes precedence


More about this issue

Container's or Pod's UID could clash with host's UID

low severity


  • Public ID: SNYK-CC-K8S-11
  • Introduced through: [DocId: 46] › input › spec › template › spec › containers[dex] › securityContext › runAsUser
  • Line number: 31818

Impact

UID of the container processes could clash with host's UIDs and lead to unintentional authorization bypass

Remediation

Set securityContext.runAsUser value to greater or equal than 10'000. SecurityContext can be set on both pod and container level. If both are set, then the container level takes precedence


More about this issue

Container's or Pod's UID could clash with host's UID

low severity


  • Public ID: SNYK-CC-K8S-11
  • Introduced through: [DocId: 47] › input › spec › template › spec › containers[argocd-notifications-controller] › securityContext › runAsUser
  • Line number: 31942

Impact

UID of the container processes could clash with host's UIDs and lead to unintentional authorization bypass

Remediation

Set securityContext.runAsUser value to greater or equal than 10'000. SecurityContext can be set on both pod and container level. If both are set, then the container level takes precedence


More about this issue

Container's or Pod's UID could clash with host's UID

low severity


  • Public ID: SNYK-CC-K8S-11
  • Introduced through: [DocId: 48] › input › spec › template › spec › containers[redis] › securityContext › runAsUser
  • Line number: 32027

Impact

UID of the container processes could clash with host's UIDs and lead to unintentional authorization bypass

Remediation

Set securityContext.runAsUser value to greater or equal than 10'000. SecurityContext can be set on both pod and container level. If both are set, then the container level takes precedence


More about this issue

Container's or Pod's UID could clash with host's UID

low severity


  • Public ID: SNYK-CC-K8S-11
  • Introduced through: [DocId: 48] › input › spec › template › spec › initContainers[secret-init] › securityContext › runAsUser
  • Line number: 32041

Impact

UID of the container processes could clash with host's UIDs and lead to unintentional authorization bypass

Remediation

Set securityContext.runAsUser value to greater or equal than 10'000. SecurityContext can be set on both pod and container level. If both are set, then the container level takes precedence


More about this issue

Container's or Pod's UID could clash with host's UID

low severity


  • Public ID: SNYK-CC-K8S-11
  • Introduced through: [DocId: 49] › input › spec › template › spec › initContainers[copyutil] › securityContext › runAsUser
  • Line number: 32390

Impact

UID of the container processes could clash with host's UIDs and lead to unintentional authorization bypass

Remediation

Set securityContext.runAsUser value to greater or equal than 10'000. SecurityContext can be set on both pod and container level. If both are set, then the container level takes precedence


More about this issue

Container's or Pod's UID could clash with host's UID

low severity


  • Public ID: SNYK-CC-K8S-11
  • Introduced through: [DocId: 49] › input › spec › template › spec › containers[argocd-repo-server] › securityContext › runAsUser
  • Line number: 32355

Impact

UID of the container processes could clash with host's UIDs and lead to unintentional authorization bypass

Remediation

Set securityContext.runAsUser value to greater or equal than 10'000. SecurityContext can be set on both pod and container level. If both are set, then the container level takes precedence


More about this issue

Container's or Pod's UID could clash with host's UID

low severity


  • Public ID: SNYK-CC-K8S-11
  • Introduced through: [DocId: 50] › input › spec › template › spec › containers[argocd-server] › securityContext › runAsUser
  • Line number: 32779

Impact

UID of the container processes could clash with host's UIDs and lead to unintentional authorization bypass

Remediation

Set securityContext.runAsUser value to greater or equal than 10'000. SecurityContext can be set on both pod and container level. If both are set, then the container level takes precedence


More about this issue

Container's or Pod's UID could clash with host's UID

low severity


  • Public ID: SNYK-CC-K8S-11
  • Introduced through: [DocId: 51] › input › spec › template › spec › containers[argocd-application-controller] › securityContext › runAsUser
  • Line number: 33155

Impact

UID of the container processes could clash with host's UIDs and lead to unintentional authorization bypass

Remediation

Set securityContext.runAsUser value to greater or equal than 10'000. SecurityContext can be set on both pod and container level. If both are set, then the container level takes precedence


More about this issue