diff --git a/render/render.go b/render/render.go index d86c3b0..c17193c 100644 --- a/render/render.go +++ b/render/render.go @@ -1,9 +1,12 @@ package render import ( - _ "embed" + "embed" "encoding/json" + "io/fs" "os" + "path/filepath" + "slices" "text/template" k8s "github.com/aquasecurity/trivy/pkg/k8s/report" @@ -11,8 +14,10 @@ import ( "golang.org/x/xerrors" ) -//go:embed template/html.tpl -var htmlTmpl []byte +//go:embed templates/* +var templates embed.FS + +var extensions = []string{".tpl", ".js", ".css"} func Render(fileName string, inputData []byte) error { var kubernetes k8s.Report @@ -31,7 +36,23 @@ func Render(fileName string, inputData []byte) error { results = append(results, resource.Results...) } - tmpl, err := template.New("temp").Parse(string(htmlTmpl)) + templateFS, err := fs.Sub(templates, "templates") + if err != nil { + return xerrors.Errorf("error loading templates: %w", err) + } + + files, err := collectFiles(templateFS) + if err != nil { + return xerrors.Errorf("error collecting files: %w", err) + } + + tmpl, err := template.New("temp").Funcs(template.FuncMap{ + "toJSON": func(v interface{}) (string, error) { + bytes, err := json.Marshal(v) + return string(bytes), err + }, + }).ParseFS(templateFS, files...) + if err != nil { return xerrors.Errorf("error parsing template: %v\n", err) } @@ -42,9 +63,34 @@ func Render(fileName string, inputData []byte) error { } defer output.Close() - if err = tmpl.Execute(output, results); err != nil { + if err = tmpl.ExecuteTemplate(output, "html.tpl", results); err != nil { return xerrors.Errorf("error executing template: %v\n", err) } return nil } + +func collectFiles(templateFS fs.FS) ([]string, error) { + var files []string + err := fs.WalkDir(templateFS, ".", func(path string, d fs.DirEntry, err error) error { + if err != nil { + return xerrors.Errorf("error listing files in %s: %w", path, err) + } + + if d.IsDir() { + return nil + } + + if slices.Contains(extensions, filepath.Ext(path)) { + files = append(files, path) + } + + return nil + }) + + if err != nil { + return nil, xerrors.Errorf("error listing files: %w", err) + } + + return files, nil +} diff --git a/render/render_test.go b/render/render_test.go index a04308d..30c74f0 100644 --- a/render/render_test.go +++ b/render/render_test.go @@ -22,6 +22,11 @@ func TestRender(t *testing.T) { jsonPath: "testdata/input/happy.json", goldenPath: "testdata/golden/happy.html", }, + { + name: "graph", + jsonPath: "testdata/input/graph.json", + goldenPath: "testdata/golden/graph.html", + }, { name: "happy k8s", jsonPath: "testdata/input/happy-k8s.json", diff --git a/render/template/html.tpl b/render/template/html.tpl deleted file mode 100644 index 36f3b36..0000000 --- a/render/template/html.tpl +++ /dev/null @@ -1,739 +0,0 @@ - - - - - - Trivy Report - - - - - - - - -
-{{- if . }} -

Trivy Report - {{ ( index . 0 ).Target }} -

-
- -
- - -{{- range . }} -{{- if or .Vulnerabilities .Misconfigurations .Secrets}} -
-

{{ .Target}}

-
- -{{- if .Vulnerabilities }} - - - - - - - - - - - - - {{- range .Vulnerabilities }} - - - - - - - - - {{- end}} - -
Package - - - - Vulnerability ID - - - - Severity - - - - Installed Version - - - - Fixed Version - - - - Links - - - -
{{ .PkgName }}{{ .VulnerabilityID }}{{ .Vulnerability.Severity }}{{ .InstalledVersion }}{{ .FixedVersion }}
-{{- end }} - - {{- if .Misconfigurations }} - - - - - - - - - - - - - - {{- range .Misconfigurations }} - - - - - - - - {{- end}} - -
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
{{ .Type}}{{ .ID }}{{ .Title }}{{ .Severity }}{{ .Message }} -
- {{ .PrimaryURL }} -
-
-{{- end }} - -{{- if .Secrets }} -
-

- {{ .Target }} - ({{ .Class }}) -

- -
- {{- $target := .Target }} - {{- range .Secrets }} -
-
- {{ .Severity }} - {{.Category}} ({{ .RuleID }}) -
-
{{ .Title }}
-
- {{ $target}} - : - - {{ if eq .StartLine .EndLine }} - {{ .StartLine }} - {{ else }} - {{ .StartLine }} - {{ .EndLine }} - {{ end }} -
-
- {{- range .Code.Lines }} - {{- if .IsCause}} -
-
{{ .Number}}
-
-
 {{.Content}}
-
-
- {{- else}} -
-
{{ .Number}}
-
-
 {{.Content}} 
-
-
- {{- end }} - {{- end}} -
-
-
- {{- end}} -
- {{- end}} - -{{- if .Packages }} -
-

Packages

-
- - - - - - - - - - - - - - {{- range .Packages }} - - - - - - - - {{- end}} - -
ID - - - - Name - - - - Version - - - - SrcName - - - - SrcVersion - - - -
{{ .ID }}{{ .Name }}{{ .Version }}{{ .SrcName }}{{ .SrcVersion }}
-{{- end }} - -{{- end }} -{{- end }} -{{- else }} -

Trivy Returned Empty Report

-{{- end }} -

- - \ No newline at end of file diff --git a/render/templates/html.tpl b/render/templates/html.tpl new file mode 100644 index 0000000..0a29b84 --- /dev/null +++ b/render/templates/html.tpl @@ -0,0 +1,327 @@ + + + + + + Trivy Report + + + + +{{- if . }} +

Trivy Report - {{ ( index . 0 ).Target }} +

+
+ +
+ +
+
+ + +
+ + + +
+
+
+
+
+
+ +
+ +{{- range $resultIndex, $result := . }} +{{- if or .Vulnerabilities .Misconfigurations .Secrets}} + +
+

{{ .Target}}

+
+{{- if .Vulnerabilities }} + + + + + + + + + + + + + {{- range .Vulnerabilities }} + + + + + + + + + {{- end}} + +
Package + + + + Vulnerability ID + + + + Severity + + + + Installed Version + + + + Fixed Version + + + + Links + + + +
{{ .PkgName }}{{ .VulnerabilityID }}{{ .Vulnerability.Severity }}{{ .InstalledVersion }}{{ .FixedVersion }}
+{{- end }} + + +{{- if .Misconfigurations }} +
+ + + + + + + + + + + + + + + {{- range $index, $misc:= .Misconfigurations }} + + + + + + + + {{- end}} + +
Type + + + + Misconf ID + + + + Check + + + + Severity + + + + Message + + + +
{{ .Type}} {{ .ID }}{{ .Title }}{{ .Severity }}{{ .Message }} +
+ {{ .PrimaryURL }} +
+
+ +
+
+ +
+ + +
+
+
+ +
+
+{{- end }} + + +{{- if .Secrets }} +
+

+ {{ .Target }} + ({{ .Class }}) +

+ +
+ {{- $target := .Target }} + {{- range .Secrets }} +
+
+ {{ .Severity }} + {{.Category}} ({{ .RuleID }}) +
+
{{ .Title }}
+
+ {{ $target}} + : + + {{ if eq .StartLine .EndLine }} + {{ .StartLine }} + {{ else }} + {{ .StartLine }} - {{ .EndLine }} + {{ end }} +
+
+ {{- range .Code.Lines }} + {{- if .IsCause}} +
+
{{ .Number}}
+
+
 {{.Content}}
+
+
+ {{- else}} +
+
{{ .Number}}
+
+
 {{.Content}} 
+
+
+ {{- end }} + {{- end}} +
+
+
+ {{- end}} +
+{{- end}} + +{{- if .Packages }} +
+

Packages

+
+ + + + + + + + + + + + + + {{- range .Packages }} + + + + + + + + {{- end}} + +
ID + + + + Name + + + + Version + + + + SrcName + + + + SrcVersion + + + +
{{ .ID }}{{ .Name }}{{ .Version }}{{ .SrcName }}{{ .SrcVersion }}
+{{- end }} + +{{- end }} + +{{- end }} +{{- else }} +

Trivy Returned Empty Report

+{{- end }} + + + + + + + + \ No newline at end of file diff --git a/render/templates/src/components/graph.js b/render/templates/src/components/graph.js new file mode 100644 index 0000000..bedca22 --- /dev/null +++ b/render/templates/src/components/graph.js @@ -0,0 +1,353 @@ +const codeNode = 1 << 1; +const occurrenceNode = 1 << 2; +let inWindow = false; +let currentTable; +let cy = cytoscape({ + container: document.querySelector('.graph'), + elements: [], + style: [ + { + selector: 'node', + style: { + label: 'data(label)', + 'background-color': '#666', + color: '#000', + 'text-valign': 'center', + 'text-halign': 'center', + width: '80px', + height: '80px', + }, + }, + { + selector: `node[type=${codeNode}]`, + style: { + 'background-color': '#c8c8c8', + 'font-size': '14px', + 'text-valign': 'center', + 'text-halign': 'center', + }, + }, + { + selector: `node[type=${occurrenceNode}]`, + style: {'background-color': '#1E90FF'}, + }, + { + selector: 'edge', + style: { + label: 'data(label)', + width: 3, + 'line-color': '#ccc', + 'curve-style': 'bezier', + 'target-arrow-color': 'black', + 'target-arrow-shape': 'triangle', + }, + }, + ], + layout: { + name: 'cose', + }, +}); + +async function init() { + function createSublist(tableIndex, misconfigurations) { + const table = document.querySelector(`.misc-table[data-index = "${tableIndex}"]`); + const content = document.querySelector(`.content[data-index = "${tableIndex}"]`) + const allContent = document.querySelectorAll('.content'); + const allTables = document.querySelectorAll('table'); + const info = document.getElementById('info'); + + misconfigurations.forEach((misconfig, idx) => { + const listItem = document.querySelector(`[data-index="${tableIndex} ${idx}"]`); + listItem.addEventListener('click', function (e) { + e.stopPropagation(); + currentTable = table; + if (!inWindow) { + changeContainer(tableIndex) + allTables.forEach((table) => { + table.style.width = "100%"; + + }); + + allContent.forEach((item) => { + item.style.display = "none"; + }); + info.style.position = 'absolute'; + + table.style.width = '70%'; + content.style.display = 'flex'; + + removePlaceholderRows(); + addPlaceholderRows(); + + } else { + info.style.position = 'fixed'; + } + + info.style.display = "none"; + renderGraph(misconfig); + }); + + }); + + } + + results.forEach((result, index) => { + if (result.Misconfigurations === undefined) { + return; + } + + createSublist(index, result.Misconfigurations); + + }); +} + +window.onload = init; + +function addPlaceholderRows() { + const rowCount = currentTable.querySelectorAll("tr").length; + const targetRows = 10; + const placeholderCount = targetRows - rowCount; + + for (let i = 0; i < placeholderCount; i++) { + const placeholderRow = document.createElement("tr"); + placeholderRow.classList.add("placeholder-row"); + placeholderRow.innerHTML = ""; + currentTable.querySelector("tbody").appendChild(placeholderRow); + } +} + +function removePlaceholderRows() { + const placeholders = document.querySelectorAll(".placeholder-row"); + placeholders.forEach(row => row.remove()); +} + +function changeContainer(index) { + const newContainer = document.querySelector(`.graph[data-index="${index}"]`); + + const elements = cy.json().elements.nodes ? cy.json().elements : []; + + const style = cy.style().json(); + + cy.destroy(); + + cy = cytoscape({ + container: newContainer, + elements: elements, + style: style, + layout: {name: 'cose'} + }); + + addInfoEventsListening(index); +} + +function addInfoEventsListening(index) { + cy.on('tap', 'node', function (evt) { + const node = evt.target; + const infoBox = document.getElementById("info"); + const graphRect = document.querySelector(`.graph[data-index="${index}"]`).getBoundingClientRect(); + + let content = ''; + if (node.data('type') === codeNode) { + content = `Code Snippet:
${node.data('content')}
`; + } else if (node.data('type') === occurrenceNode) { + content = `File: ${node.data('file')}
Location: Lines ${node.data('start')} - ${node.data('end')}`; + } + + let top = graphRect.top + evt.renderedPosition.y; + let left = window.scrollX + graphRect.left + evt.renderedPosition.x; + + if (!inWindow) { + top += window.scrollY; + } + + infoBox.innerHTML = content; + infoBox.style.left = left + 'px'; + infoBox.style.top = top + 'px'; + infoBox.style.display = 'block'; + }); + + cy.on('tap', function (event) { + if (event.target === cy) { + document.getElementById("info").style.display = 'none'; + } + }); +} + +function renderGraph(misconf) { + const nodes = []; + const edges = []; + + if (misconf.CauseMetadata === undefined) { + return; + } + + const findingID = `finding`; + if (misconf.CauseMetadata.Code?.Lines !== null) { + const code = misconf.CauseMetadata.Code?.Lines.reduce((prev, curr, idx) => { + if (idx === 0) { + return curr.Content; + } + return prev + '\n' + curr.Content; + }, ''); + + const highlightedCode = hljs.highlight(code, {language: 'hcl'}).value; + + nodes.push({ + data: { + id: findingID, + label: misconf.CauseMetadata.Resource, + type: codeNode, + content: highlightedCode, + }, + }); + } + + if (misconf.CauseMetadata.Occurrences !== undefined) { + misconf.CauseMetadata.Occurrences.forEach((occurrence, idx) => { + const occurenceID = `${idx}-occurrence`; + nodes.push({ + data: { + id: occurenceID, + label: occurrence.Resource, + type: occurrenceNode, + file: occurrence.Filename, + start: occurrence.Location.StartLine, + end: occurrence.Location.EndLine, + }, + }); + + const edgeID = `${idx}-edge`; + + // the first occurrence is the cause, which is stored in the cause metadata + if (idx === 0) { + edges.push({ + data: { + id: edgeID, + source: occurenceID, + target: findingID, + label: 'Caused by', + }, + }); + } else { + const targetID = `${idx - 1}-occurrence`; + + edges.push({ + data: { + id: edgeID, + source: occurenceID, + target: targetID, + label: 'Caused by', + }, + }); + } + }); + } + cy.elements().remove(); + cy.add(nodes); + cy.add(edges); + + cy.layout({name: 'cose'}).run(); + +} + + +const allTables = document.querySelectorAll('table'); +const closeContent = document.querySelectorAll('.close-button'); +const content = document.querySelectorAll('.content'); +const info = document.getElementById('info'); +const movableWindow = document.getElementById('movable-window'); +const hideButton = document.querySelector('.hide-window'); +const openWindow = document.querySelectorAll('.open-window-button'); + +closeContent.forEach((button) => { + button.addEventListener('click', () => { + info.style.display = 'none'; + allTables.forEach((table) => { + table.style.width = "100%"; + + }); + removePlaceholderRows(); + content.forEach((item) => { + item.style.display = "none"; + }); + }); + +}); + +function closeMovableWindow() { + movableWindow.style.display = 'none'; + info.style.display = 'none'; + inWindow = false; +} + +document.querySelector('.close-window').addEventListener('click', () => { + closeMovableWindow(); +}); + +hideButton.addEventListener("click", () => { + movableWindow.classList.toggle('hidden'); + info.style.display = 'none'; +}); + +openWindow.forEach((button) => { + button.addEventListener("click", () => { + if (inWindow) { + inWindow = false; + let index = currentTable.getAttribute('data-index'); + let content = document.querySelector(`.content[data-index = "${index}"]`) + closeMovableWindow(); + changeContainer(index); + currentTable.style.width = '70%'; + info.style.display = 'none'; + info.style.position = 'absolute'; + content.style.display = 'flex'; + } else { + inWindow = true; + changeContainer("window"); + removePlaceholderRows(); + + allTables.forEach((table) => { + table.style.width = '100%'; + }); + + document.querySelectorAll('.content').forEach((item) => { + item.style.display = "none"; + }); + + info.style.position = 'fixed'; + info.style.display = 'none'; + + movableWindow.style.display = 'block'; + } + + }); +}); + + +const header = document.getElementById('movable-header'); + +let isDragging = false; +let offsetX = 0; +let offsetY = 0; + +header.addEventListener('mousedown', (e) => { + isDragging = true; + offsetX = e.clientX - movableWindow.offsetLeft; + offsetY = e.clientY - movableWindow.offsetTop; + document.body.style.userSelect = 'none'; +}); + +document.addEventListener('mousemove', (e) => { + if (isDragging) { + let newLeft = e.clientX - offsetX; + let newTop = e.clientY - offsetY; + + newLeft = Math.max(0, Math.min(window.innerWidth - movableWindow.offsetWidth, newLeft)); + newTop = Math.max(0, Math.min(window.innerHeight - movableWindow.offsetHeight, newTop)); + + movableWindow.style.left = newLeft + 'px'; + movableWindow.style.top = newTop + 'px'; + + cy.resize() + } +}); \ No newline at end of file diff --git a/render/templates/src/components/interactivity.js b/render/templates/src/components/interactivity.js new file mode 100644 index 0000000..e6aa04c --- /dev/null +++ b/render/templates/src/components/interactivity.js @@ -0,0 +1,139 @@ +document.addEventListener('mouseup', () => { + isDragging = false; + document.body.style.userSelect = ''; +}); + +function insertAfter(referenceNode, newNode) { + referenceNode.parentNode.insertBefore(newNode, referenceNode.nextSibling); +} + +const severityOrder = { + UNKNOWN: {order: 5}, + LOW: {order: 4}, + MEDIUM: {order: 3}, + HIGH: {order: 2}, + CRITICAL: {order: 1}, +}; + +function attachLinksInteractivity() { + document.querySelectorAll("td.links").forEach(function (linkCell) { + const links = [].concat.apply([], linkCell.querySelectorAll("a")); + [].sort.apply(links, function (a, b) { + return a.href > b.href ? 1 : -1; + }); + links.forEach(function (link, idx) { + if (links.length > 0 && 0 === idx) { + const toggleLink = document.createElement("a"); + toggleLink.innerText = "Toggle more links"; + toggleLink.href = "#toggleMore"; + toggleLink.setAttribute("class", "toggle-more-links"); + linkCell.appendChild(toggleLink); + } + linkCell.appendChild(link); + }); + }); + + document + .querySelectorAll("a.toggle-more-links") + .forEach(function (toggleLink) { + toggleLink.onclick = function () { + const expanded = + toggleLink.parentElement.getAttribute("data-more-links"); + toggleLink.parentElement.setAttribute( + "data-more-links", + "on" === expanded ? "off" : "on" + ); + return false; + }; + }); +} + +function attachFilterInteractivity() { + const filterBar = document.querySelector(".filter_bar"); + const nameFilter = filterBar.querySelector(".filter_bar__filter_name"); + const filterable = document.querySelectorAll(".filterable"); + const cellClasses = [ + ".pkg-name", + ".vuln", + ".misc-type", + ".misc-id", + ".severity", + ".pkg-version", + ".pkg-key-name", + ".pkg-key-version", + ".pkg-key-src-name", + ".pkg-key-src-version", + ]; + + function applyFilters(filterValue) { + filterable.forEach((f) => { + const cellValues = cellClasses + .map((cl) => f.querySelector(cl)) + .filter((cell) => cell !== null) + .map((cell) => cell.textContent || cell.innerText); + + const condition = cellValues.some((cellValue) => + cellValue.toUpperCase().includes(filterValue.toUpperCase()) + ); + + f.style.display = condition ? "" : "none"; + }); + } + + nameFilter.addEventListener("keyup", (e) => { + applyFilters(e.target.value); + }); +} + +function attachSortInteractivity() { + let colIx = -1; + const tables = document.querySelectorAll("table"); + const sortTable = (tableIx, cellIndex, type, isSorded) => { + const table = tables[tableIx]; + const tbody = table.querySelector('tbody[data-main="true"]'); + const thead = table.querySelector("thead"); + const inv = (val) => (isSorded ? -val : val); + const compare = (a, b) => { + if (!a.cells[cellIndex] || !b.cells[cellIndex]) return 0; + const rowA = a.cells[cellIndex].innerHTML; + const rowB = b.cells[cellIndex].innerHTML; + if (type === "string") { + if (rowA < rowB) return inv(-1); + if (rowA > rowB) return inv(1); + return 0; + } + if (type === "severity") { + const orderA = severityOrder[rowA].order; + const orderB = severityOrder[rowB].order; + if (orderA < orderB) return inv(-1); + if (orderA > orderB) return inv(1); + return 0; + } + }; + let rows = Array(...tbody.rows); + rows.sort(compare); + table.removeChild(tbody); + rows.forEach((row) => { + tbody.appendChild(row); + }); + insertAfter(thead, tbody); + }; + tables.forEach((table, tableIx) => { + table.addEventListener("click", (e) => { + e.stopPropagation(); + const el = e.target; + const type = el.getAttribute("data-type"); + const sortable = el.getAttribute("data-sortable") === "true"; + if (el.nodeName !== "TH" || !sortable) return; + const cellIndex = el.cellIndex; + sortTable(tableIx, cellIndex, type, colIx === cellIndex); + colIx = colIx === cellIndex ? -1 : cellIndex; + }); + }); +} + +document.addEventListener("DOMContentLoaded", () => { + attachLinksInteractivity(); + attachSortInteractivity(); + attachFilterInteractivity(); +}); \ No newline at end of file diff --git a/render/templates/src/components/style.css b/render/templates/src/components/style.css new file mode 100644 index 0000000..1f4e16a --- /dev/null +++ b/render/templates/src/components/style.css @@ -0,0 +1,351 @@ +* { + font-family: Arial, Helvetica, sans-serif; +} + +body { + height: 100vh; + width: 99vw; +} + +h1, h2 { + text-align: center; +} + +.top-vuln-title, .top-misc-title { + border-bottom: 1px solid #0000001f; +} + +.initially-disabled { + display: none; +} + +.link { + text-overflow: ellipsis; + overflow: hidden; + width: 100%; + height: 1.2em; + white-space: nowrap; +} + +.vuln { + word-wrap: anywhere; +} + +.group-header th { + font-size: 200%; +} + +table, +th, +td { + width: 100%; + border-top: 1px solid #0000001f; + border-collapse: collapse; + padding: .3em; + white-space: normal; +} + +table { + margin-left: 0; + table-layout: fixed; + border: 2px solid #ddd; +} + +.placeholder-row td { + height: 30px; + border: none; + background-color: transparent; + padding: 0; +} + +.last-data-row td { + border-bottom: none; +} + +.severity { + font-weight: bold; +} + + +table tr td:first-of-type { + font-weight: bold; +} + +.links a, +.links[data-more-links=on] a { + display: block; +} + +.links[data-more-links=off] a:nth-of-type(1n+2) { + display: none; +} + +a.toggle-more-links { + cursor: pointer; +} + +th[data-sortable="true"] { + cursor: pointer; +} + +.sub-header th { + font-size: 150%; + text-align: center; + background-color: #ddd; +} + +th svg { + visibility: hidden; + pointer-events: none; +} + +th span { + pointer-events: none; +} + +.sub-header th[data-sortable="true"] svg { + visibility: visible; +} + +ul { + list-style-type: none; +} + +.search { + background-image: url("data:image/svg+xml,%3Csvg xmlns='http://www.w3.org/2000/svg' width='16' height='16' fill='%23bdbdbd' viewBox='0 0 16 16'%3E%3Cpath d='M11.742 10.344a6.5 6.5 0 1 0-1.397 1.398h-.001c.03.04.062.078.098.115l3.85 3.85a1 1 0 0 0 1.415-1.414l-3.85-3.85a1.007 1.007 0 0 0-.115-.1zM12 6.5a5.5 5.5 0 1 1-11 0 5.5 5.5 0 0 1 11 0z'%3E%3C/path%3E%3C/svg%3E"); + background-position: 10px 10px; + background-repeat: no-repeat; + width: 100%; + font-size: 16px; + padding: 12px 20px 12px 40px; + border: 1px solid #ddd; +} + +.search:focus { + outline: none; + border-color: #07f; + box-shadow: 0 0 0 2px rgba(0, 119, 255, 0.2); +} + +.filter_bar { + display: flex; + align-items: center; +} + +.filterable:hover { + background-color: #f1f1f1; +} + +.pkg-name { + width: 100%; + height: 1.2em; +} + +.ta-center { + text-align: center; +} + +.break-word { + word-wrap: break-word; +} + +.header__title { + font-size: 24px; +} + +.secret__line { + display: flex; +} + +.secret__code { + background-color: #f1f1f1; + border: #e1e1e1; + border-radius: 5px; + padding: 10px 0 10px 15px; +} + +.secret__line pre { + margin: 0; + overflow-wrap: anywhere; + white-space: pre-line; +} + +.secret__line-cause { + color: #e40000; +} + +.secret__line-number { + border-right: 1px solid black; + margin-right: 10px; + padding-right: 10px; +} + +.secret__src-file { + color: #1f6feb +} + +.secret__src-lines { + color: #1f6feb +} + +.severity-LOW { + color: #5fbb31; +} + +.severity-MEDIUM { + color: #e9c600; +} + +.severity-HIGH { + color: #ff8800; +} + +.severity-CRITICAL { + color: #e40000; +} + +.severity-UNKNOWN { + color: #747474; +} + +.secret__severity { + font-weight: bold; +} + +.secret-results__title { + margin-bottom: 0; + font-size: 24px; +} + +.secret__head { + margin-left: 15px; +} + +.secret__title { + margin-left: 15px; +} + +.secret__src { + margin-left: 15px; +} + +.secret + .secret { + margin-top: 10px; +} + +ul { + list-style: none; +} + +.hidden { + display: none; +} + +.target-item { + margin-bottom: 10px; +} + +.target-item:hover { + background-color: #7d7d7d; +} + +.sidebar li > ul { + display: none; + /* padding-left: 20px; */ +} + +.sidebar li.active > ul { + display: block; +} + +.graph { + flex-grow: 1; + background-color: #ecf0f1; + width: 100%; + height: 100%; +} + +.content { + flex-direction: column; + flex: 1 1 auto; + display: none; + background-color: #fff; + border: 1px solid #ccc; + overflow: hidden; +} + +.movable-content { + padding: 10px; + height: 100%; + background-color: #fff; + border: 1px solid #ccc; +} + +.graph-buttons button, +.open-window-button +{ + background: none; + border: none; + font-size: 18px; + color: white; + cursor: pointer; + font-weight: bold; +} + +.graph-buttons{ + flex-direction: row; + display: flex; +} + +.content-header { + position: relative; + display: flex; + justify-content: space-between; + background-color: #007bff; + color: white; + padding: 10px; + user-select: none; +} + +#movable-window { + position: fixed; + top: 2%; + right: 3%; + width: 30%; + height: 50%; + background-color: #fff; + border: 1px solid #ccc; + box-shadow: 0 4px 8px rgba(0, 0, 0, 0.2); + z-index: 1000; + display: none; +} + + +#movable-window.hidden { + height: auto; + min-height: unset; + overflow: hidden; +} + +#movable-window.hidden .movable-content { + display: none; +} + +.container { + padding-bottom: 10px; + flex-direction: row; + width: 100%; + display: flex; + overflow: hidden; +} + +#info { + display: none; + z-index: 1000; + position: absolute; + background: white; + border: 1px solid black; + padding: 5px; + left: 599px; + top: 359px; +} \ No newline at end of file diff --git a/render/templates/src/highlightjs/github.min.css b/render/templates/src/highlightjs/github.min.css new file mode 100644 index 0000000..67184f5 --- /dev/null +++ b/render/templates/src/highlightjs/github.min.css @@ -0,0 +1,85 @@ +/*! + Theme: GitHub + Description: Light theme as seen on github.com + Author: github.com + Maintainer: @Hirse + Updated: 2021-05-15 + + Outdated base version: https://github.com/primer/github-syntax-light + Current colors taken from GitHub's CSS + */ +.hljs { + color: #24292e; + background: #fff +} + +.hljs-doctag, .hljs-keyword, .hljs-meta .hljs-keyword, .hljs-template-tag, .hljs-template-variable, .hljs-type, .hljs-variable.language_ { + color: #d73a49 +} + +.hljs-title, .hljs-title.class_, .hljs-title.class_.inherited__, .hljs-title.function_ { + color: #6f42c1 +} + +.hljs-attr, .hljs-attribute, .hljs-literal, .hljs-meta, .hljs-number, .hljs-operator, .hljs-selector-attr, .hljs-selector-class, .hljs-selector-id, .hljs-variable { + color: #005cc5 +} + +.hljs-meta .hljs-string, .hljs-regexp, .hljs-string { + color: #032f62 +} + +.hljs-built_in, .hljs-symbol { + color: #e36209 +} + +.hljs-code, .hljs-comment, .hljs-formula { + color: #6a737d +} + +.hljs-name, .hljs-quote, .hljs-selector-pseudo, .hljs-selector-tag { + color: #22863a +} + +.hljs-subst { + color: #24292e +} + +.hljs-section { + color: #005cc5; + font-weight: 700 +} + +.hljs-bullet { + color: #735c0f +} + +.hljs-emphasis { + color: #24292e; + font-style: italic +} + +.hljs-strong { + color: #24292e; + font-weight: 700 +} + +.hljs-addition { + color: #22863a; + background-color: #f0fff4 +} + +.hljs-deletion { + color: #b31d28; + background-color: #ffeef0 +} + +pre code.hljs { + display: block; + overflow-x: auto; + padding: 1em +} + +code.hljs { + padding: 3px 5px +} \ No newline at end of file diff --git a/render/templates/src/highlightjs/highlight.min.js b/render/templates/src/highlightjs/highlight.min.js new file mode 100644 index 0000000..9a95dbe --- /dev/null +++ b/render/templates/src/highlightjs/highlight.min.js @@ -0,0 +1,309 @@ +/*! + Highlight.js v11.10.0 (git: 366a8bd012) + (c) 2006-2024 Josh Goebel and other contributors + License: BSD-3-Clause + */ +var hljs=function(){"use strict";function e(t){ +return t instanceof Map?t.clear=t.delete=t.set=()=>{ +throw Error("map is read-only")}:t instanceof Set&&(t.add=t.clear=t.delete=()=>{ +throw Error("set is read-only") +}),Object.freeze(t),Object.getOwnPropertyNames(t).forEach((n=>{ +const i=t[n],s=typeof i;"object"!==s&&"function"!==s||Object.isFrozen(i)||e(i) +})),t}class t{constructor(e){ +void 0===e.data&&(e.data={}),this.data=e.data,this.isMatchIgnored=!1} +ignoreMatch(){this.isMatchIgnored=!0}}function n(e){ +return e.replace(/&/g,"&").replace(//g,">").replace(/"/g,""").replace(/'/g,"'") +}function i(e,...t){const n=Object.create(null);for(const t in e)n[t]=e[t] +;return t.forEach((e=>{for(const t in e)n[t]=e[t]})),n}const s=e=>!!e.scope +;class o{constructor(e,t){ +this.buffer="",this.classPrefix=t.classPrefix,e.walk(this)}addText(e){ +this.buffer+=n(e)}openNode(e){if(!s(e))return;const t=((e,{prefix:t})=>{ +if(e.startsWith("language:"))return e.replace("language:","language-") +;if(e.includes(".")){const n=e.split(".") +;return[`${t}${n.shift()}`,...n.map(((e,t)=>`${e}${"_".repeat(t+1)}`))].join(" ") +}return`${t}${e}`})(e.scope,{prefix:this.classPrefix});this.span(t)} +closeNode(e){s(e)&&(this.buffer+="")}value(){return this.buffer}span(e){ +this.buffer+=``}}const r=(e={})=>{const t={children:[]} +;return Object.assign(t,e),t};class a{constructor(){ +this.rootNode=r(),this.stack=[this.rootNode]}get top(){ +return this.stack[this.stack.length-1]}get root(){return this.rootNode}add(e){ +this.top.children.push(e)}openNode(e){const t=r({scope:e}) +;this.add(t),this.stack.push(t)}closeNode(){ +if(this.stack.length>1)return this.stack.pop()}closeAllNodes(){ +for(;this.closeNode(););}toJSON(){return JSON.stringify(this.rootNode,null,4)} +walk(e){return this.constructor._walk(e,this.rootNode)}static _walk(e,t){ +return"string"==typeof t?e.addText(t):t.children&&(e.openNode(t), +t.children.forEach((t=>this._walk(e,t))),e.closeNode(t)),e}static _collapse(e){ +"string"!=typeof e&&e.children&&(e.children.every((e=>"string"==typeof e))?e.children=[e.children.join("")]:e.children.forEach((e=>{ +a._collapse(e)})))}}class c extends a{constructor(e){super(),this.options=e} +addText(e){""!==e&&this.add(e)}startScope(e){this.openNode(e)}endScope(){ +this.closeNode()}__addSublanguage(e,t){const n=e.root +;t&&(n.scope="language:"+t),this.add(n)}toHTML(){ +return new o(this,this.options).value()}finalize(){ +return this.closeAllNodes(),!0}}function l(e){ +return e?"string"==typeof e?e:e.source:null}function g(e){return h("(?=",e,")")} +function u(e){return h("(?:",e,")*")}function d(e){return h("(?:",e,")?")} +function h(...e){return e.map((e=>l(e))).join("")}function f(...e){const t=(e=>{ +const t=e[e.length-1] +;return"object"==typeof t&&t.constructor===Object?(e.splice(e.length-1,1),t):{} +})(e);return"("+(t.capture?"":"?:")+e.map((e=>l(e))).join("|")+")"} +function p(e){return RegExp(e.toString()+"|").exec("").length-1} +const b=/\[(?:[^\\\]]|\\.)*\]|\(\??|\\([1-9][0-9]*)|\\./ +;function m(e,{joinWith:t}){let n=0;return e.map((e=>{n+=1;const t=n +;let i=l(e),s="";for(;i.length>0;){const e=b.exec(i);if(!e){s+=i;break} +s+=i.substring(0,e.index), +i=i.substring(e.index+e[0].length),"\\"===e[0][0]&&e[1]?s+="\\"+(Number(e[1])+t):(s+=e[0], +"("===e[0]&&n++)}return s})).map((e=>`(${e})`)).join(t)} +const E="[a-zA-Z]\\w*",x="[a-zA-Z_]\\w*",w="\\b\\d+(\\.\\d+)?",y="(-?)(\\b0[xX][a-fA-F0-9]+|(\\b\\d+(\\.\\d*)?|\\.\\d+)([eE][-+]?\\d+)?)",_="\\b(0b[01]+)",O={ +begin:"\\\\[\\s\\S]",relevance:0},v={scope:"string",begin:"'",end:"'", +illegal:"\\n",contains:[O]},k={scope:"string",begin:'"',end:'"',illegal:"\\n", +contains:[O]},N=(e,t,n={})=>{const s=i({scope:"comment",begin:e,end:t, +contains:[]},n);s.contains.push({scope:"doctag", +begin:"[ ]*(?=(TODO|FIXME|NOTE|BUG|OPTIMIZE|HACK|XXX):)", +end:/(TODO|FIXME|NOTE|BUG|OPTIMIZE|HACK|XXX):/,excludeBegin:!0,relevance:0}) +;const o=f("I","a","is","so","us","to","at","if","in","it","on",/[A-Za-z]+['](d|ve|re|ll|t|s|n)/,/[A-Za-z]+[-][a-z]+/,/[A-Za-z][a-z]{2,}/) +;return s.contains.push({begin:h(/[ ]+/,"(",o,/[.]?[:]?([.][ ]|[ ])/,"){3}")}),s +},S=N("//","$"),M=N("/\\*","\\*/"),R=N("#","$");var j=Object.freeze({ +__proto__:null,APOS_STRING_MODE:v,BACKSLASH_ESCAPE:O,BINARY_NUMBER_MODE:{ +scope:"number",begin:_,relevance:0},BINARY_NUMBER_RE:_,COMMENT:N, +C_BLOCK_COMMENT_MODE:M,C_LINE_COMMENT_MODE:S,C_NUMBER_MODE:{scope:"number", +begin:y,relevance:0},C_NUMBER_RE:y,END_SAME_AS_BEGIN:e=>Object.assign(e,{ +"on:begin":(e,t)=>{t.data._beginMatch=e[1]},"on:end":(e,t)=>{ +t.data._beginMatch!==e[1]&&t.ignoreMatch()}}),HASH_COMMENT_MODE:R,IDENT_RE:E, +MATCH_NOTHING_RE:/\b\B/,METHOD_GUARD:{begin:"\\.\\s*"+x,relevance:0}, +NUMBER_MODE:{scope:"number",begin:w,relevance:0},NUMBER_RE:w, +PHRASAL_WORDS_MODE:{ +begin:/\b(a|an|the|are|I'm|isn't|don't|doesn't|won't|but|just|should|pretty|simply|enough|gonna|going|wtf|so|such|will|you|your|they|like|more)\b/ +},QUOTE_STRING_MODE:k,REGEXP_MODE:{scope:"regexp",begin:/\/(?=[^/\n]*\/)/, +end:/\/[gimuy]*/,contains:[O,{begin:/\[/,end:/\]/,relevance:0,contains:[O]}]}, +RE_STARTERS_RE:"!|!=|!==|%|%=|&|&&|&=|\\*|\\*=|\\+|\\+=|,|-|-=|/=|/|:|;|<<|<<=|<=|<|===|==|=|>>>=|>>=|>=|>>>|>>|>|\\?|\\[|\\{|\\(|\\^|\\^=|\\||\\|=|\\|\\||~", +SHEBANG:(e={})=>{const t=/^#![ ]*\// +;return e.binary&&(e.begin=h(t,/.*\b/,e.binary,/\b.*/)),i({scope:"meta",begin:t, +end:/$/,relevance:0,"on:begin":(e,t)=>{0!==e.index&&t.ignoreMatch()}},e)}, +TITLE_MODE:{scope:"title",begin:E,relevance:0},UNDERSCORE_IDENT_RE:x, +UNDERSCORE_TITLE_MODE:{scope:"title",begin:x,relevance:0}});function A(e,t){ +"."===e.input[e.index-1]&&t.ignoreMatch()}function I(e,t){ +void 0!==e.className&&(e.scope=e.className,delete e.className)}function T(e,t){ +t&&e.beginKeywords&&(e.begin="\\b("+e.beginKeywords.split(" ").join("|")+")(?!\\.)(?=\\b|\\s)", +e.__beforeBegin=A,e.keywords=e.keywords||e.beginKeywords,delete e.beginKeywords, +void 0===e.relevance&&(e.relevance=0))}function L(e,t){ +Array.isArray(e.illegal)&&(e.illegal=f(...e.illegal))}function B(e,t){ +if(e.match){ +if(e.begin||e.end)throw Error("begin & end are not supported with match") +;e.begin=e.match,delete e.match}}function P(e,t){ +void 0===e.relevance&&(e.relevance=1)}const D=(e,t)=>{if(!e.beforeMatch)return +;if(e.starts)throw Error("beforeMatch cannot be used with starts") +;const n=Object.assign({},e);Object.keys(e).forEach((t=>{delete e[t] +})),e.keywords=n.keywords,e.begin=h(n.beforeMatch,g(n.begin)),e.starts={ +relevance:0,contains:[Object.assign(n,{endsParent:!0})] +},e.relevance=0,delete n.beforeMatch +},H=["of","and","for","in","not","or","if","then","parent","list","value"],C="keyword" +;function $(e,t,n=C){const i=Object.create(null) +;return"string"==typeof e?s(n,e.split(" ")):Array.isArray(e)?s(n,e):Object.keys(e).forEach((n=>{ +Object.assign(i,$(e[n],t,n))})),i;function s(e,n){ +t&&(n=n.map((e=>e.toLowerCase()))),n.forEach((t=>{const n=t.split("|") +;i[n[0]]=[e,U(n[0],n[1])]}))}}function U(e,t){ +return t?Number(t):(e=>H.includes(e.toLowerCase()))(e)?0:1}const z={},W=e=>{ +console.error(e)},X=(e,...t)=>{console.log("WARN: "+e,...t)},G=(e,t)=>{ +z[`${e}/${t}`]||(console.log(`Deprecated as of ${e}. ${t}`),z[`${e}/${t}`]=!0) +},K=Error();function F(e,t,{key:n}){let i=0;const s=e[n],o={},r={} +;for(let e=1;e<=t.length;e++)r[e+i]=s[e],o[e+i]=!0,i+=p(t[e-1]) +;e[n]=r,e[n]._emit=o,e[n]._multi=!0}function Z(e){(e=>{ +e.scope&&"object"==typeof e.scope&&null!==e.scope&&(e.beginScope=e.scope, +delete e.scope)})(e),"string"==typeof e.beginScope&&(e.beginScope={ +_wrap:e.beginScope}),"string"==typeof e.endScope&&(e.endScope={_wrap:e.endScope +}),(e=>{if(Array.isArray(e.begin)){ +if(e.skip||e.excludeBegin||e.returnBegin)throw W("skip, excludeBegin, returnBegin not compatible with beginScope: {}"), +K +;if("object"!=typeof e.beginScope||null===e.beginScope)throw W("beginScope must be object"), +K;F(e,e.begin,{key:"beginScope"}),e.begin=m(e.begin,{joinWith:""})}})(e),(e=>{ +if(Array.isArray(e.end)){ +if(e.skip||e.excludeEnd||e.returnEnd)throw W("skip, excludeEnd, returnEnd not compatible with endScope: {}"), +K +;if("object"!=typeof e.endScope||null===e.endScope)throw W("endScope must be object"), +K;F(e,e.end,{key:"endScope"}),e.end=m(e.end,{joinWith:""})}})(e)}function V(e){ +function t(t,n){ +return RegExp(l(t),"m"+(e.case_insensitive?"i":"")+(e.unicodeRegex?"u":"")+(n?"g":"")) +}class n{constructor(){ +this.matchIndexes={},this.regexes=[],this.matchAt=1,this.position=0} +addRule(e,t){ +t.position=this.position++,this.matchIndexes[this.matchAt]=t,this.regexes.push([t,e]), +this.matchAt+=p(e)+1}compile(){0===this.regexes.length&&(this.exec=()=>null) +;const e=this.regexes.map((e=>e[1]));this.matcherRe=t(m(e,{joinWith:"|" +}),!0),this.lastIndex=0}exec(e){this.matcherRe.lastIndex=this.lastIndex +;const t=this.matcherRe.exec(e);if(!t)return null +;const n=t.findIndex(((e,t)=>t>0&&void 0!==e)),i=this.matchIndexes[n] +;return t.splice(0,n),Object.assign(t,i)}}class s{constructor(){ +this.rules=[],this.multiRegexes=[], +this.count=0,this.lastIndex=0,this.regexIndex=0}getMatcher(e){ +if(this.multiRegexes[e])return this.multiRegexes[e];const t=new n +;return this.rules.slice(e).forEach((([e,n])=>t.addRule(e,n))), +t.compile(),this.multiRegexes[e]=t,t}resumingScanAtSamePosition(){ +return 0!==this.regexIndex}considerAll(){this.regexIndex=0}addRule(e,t){ +this.rules.push([e,t]),"begin"===t.type&&this.count++}exec(e){ +const t=this.getMatcher(this.regexIndex);t.lastIndex=this.lastIndex +;let n=t.exec(e) +;if(this.resumingScanAtSamePosition())if(n&&n.index===this.lastIndex);else{ +const t=this.getMatcher(0);t.lastIndex=this.lastIndex+1,n=t.exec(e)} +return n&&(this.regexIndex+=n.position+1, +this.regexIndex===this.count&&this.considerAll()),n}} +if(e.compilerExtensions||(e.compilerExtensions=[]), +e.contains&&e.contains.includes("self"))throw Error("ERR: contains `self` is not supported at the top-level of a language. See documentation.") +;return e.classNameAliases=i(e.classNameAliases||{}),function n(o,r){const a=o +;if(o.isCompiled)return a +;[I,B,Z,D].forEach((e=>e(o,r))),e.compilerExtensions.forEach((e=>e(o,r))), +o.__beforeBegin=null,[T,L,P].forEach((e=>e(o,r))),o.isCompiled=!0;let c=null +;return"object"==typeof o.keywords&&o.keywords.$pattern&&(o.keywords=Object.assign({},o.keywords), +c=o.keywords.$pattern, +delete o.keywords.$pattern),c=c||/\w+/,o.keywords&&(o.keywords=$(o.keywords,e.case_insensitive)), +a.keywordPatternRe=t(c,!0), +r&&(o.begin||(o.begin=/\B|\b/),a.beginRe=t(a.begin),o.end||o.endsWithParent||(o.end=/\B|\b/), +o.end&&(a.endRe=t(a.end)), +a.terminatorEnd=l(a.end)||"",o.endsWithParent&&r.terminatorEnd&&(a.terminatorEnd+=(o.end?"|":"")+r.terminatorEnd)), +o.illegal&&(a.illegalRe=t(o.illegal)), +o.contains||(o.contains=[]),o.contains=[].concat(...o.contains.map((e=>(e=>(e.variants&&!e.cachedVariants&&(e.cachedVariants=e.variants.map((t=>i(e,{ +variants:null},t)))),e.cachedVariants?e.cachedVariants:q(e)?i(e,{ +starts:e.starts?i(e.starts):null +}):Object.isFrozen(e)?i(e):e))("self"===e?o:e)))),o.contains.forEach((e=>{n(e,a) +})),o.starts&&n(o.starts,r),a.matcher=(e=>{const t=new s +;return e.contains.forEach((e=>t.addRule(e.begin,{rule:e,type:"begin" +}))),e.terminatorEnd&&t.addRule(e.terminatorEnd,{type:"end" +}),e.illegal&&t.addRule(e.illegal,{type:"illegal"}),t})(a),a}(e)}function q(e){ +return!!e&&(e.endsWithParent||q(e.starts))}class J extends Error{ +constructor(e,t){super(e),this.name="HTMLInjectionError",this.html=t}} +const Y=n,Q=i,ee=Symbol("nomatch"),te=n=>{ +const i=Object.create(null),s=Object.create(null),o=[];let r=!0 +;const a="Could not find the language '{}', did you forget to load/include a language module?",l={ +disableAutodetect:!0,name:"Plain text",contains:[]};let p={ +ignoreUnescapedHTML:!1,throwUnescapedHTML:!1,noHighlightRe:/^(no-?highlight)$/i, +languageDetectRe:/\blang(?:uage)?-([\w-]+)\b/i,classPrefix:"hljs-", +cssSelector:"pre code",languages:null,__emitter:c};function b(e){ +return p.noHighlightRe.test(e)}function m(e,t,n){let i="",s="" +;"object"==typeof t?(i=e, +n=t.ignoreIllegals,s=t.language):(G("10.7.0","highlight(lang, code, ...args) has been deprecated."), +G("10.7.0","Please use highlight(code, options) instead.\nhttps://github.com/highlightjs/highlight.js/issues/2277"), +s=e,i=t),void 0===n&&(n=!0);const o={code:i,language:s};N("before:highlight",o) +;const r=o.result?o.result:E(o.language,o.code,n) +;return r.code=o.code,N("after:highlight",r),r}function E(e,n,s,o){ +const c=Object.create(null);function l(){if(!N.keywords)return void M.addText(R) +;let e=0;N.keywordPatternRe.lastIndex=0;let t=N.keywordPatternRe.exec(R),n="" +;for(;t;){n+=R.substring(e,t.index) +;const s=_.case_insensitive?t[0].toLowerCase():t[0],o=(i=s,N.keywords[i]);if(o){ +const[e,i]=o +;if(M.addText(n),n="",c[s]=(c[s]||0)+1,c[s]<=7&&(j+=i),e.startsWith("_"))n+=t[0];else{ +const n=_.classNameAliases[e]||e;u(t[0],n)}}else n+=t[0] +;e=N.keywordPatternRe.lastIndex,t=N.keywordPatternRe.exec(R)}var i +;n+=R.substring(e),M.addText(n)}function g(){null!=N.subLanguage?(()=>{ +if(""===R)return;let e=null;if("string"==typeof N.subLanguage){ +if(!i[N.subLanguage])return void M.addText(R) +;e=E(N.subLanguage,R,!0,S[N.subLanguage]),S[N.subLanguage]=e._top +}else e=x(R,N.subLanguage.length?N.subLanguage:null) +;N.relevance>0&&(j+=e.relevance),M.__addSublanguage(e._emitter,e.language) +})():l(),R=""}function u(e,t){ +""!==e&&(M.startScope(t),M.addText(e),M.endScope())}function d(e,t){let n=1 +;const i=t.length-1;for(;n<=i;){if(!e._emit[n]){n++;continue} +const i=_.classNameAliases[e[n]]||e[n],s=t[n];i?u(s,i):(R=s,l(),R=""),n++}} +function h(e,t){ +return e.scope&&"string"==typeof e.scope&&M.openNode(_.classNameAliases[e.scope]||e.scope), +e.beginScope&&(e.beginScope._wrap?(u(R,_.classNameAliases[e.beginScope._wrap]||e.beginScope._wrap), +R=""):e.beginScope._multi&&(d(e.beginScope,t),R="")),N=Object.create(e,{parent:{ +value:N}}),N}function f(e,n,i){let s=((e,t)=>{const n=e&&e.exec(t) +;return n&&0===n.index})(e.endRe,i);if(s){if(e["on:end"]){const i=new t(e) +;e["on:end"](n,i),i.isMatchIgnored&&(s=!1)}if(s){ +for(;e.endsParent&&e.parent;)e=e.parent;return e}} +if(e.endsWithParent)return f(e.parent,n,i)}function b(e){ +return 0===N.matcher.regexIndex?(R+=e[0],1):(T=!0,0)}function m(e){ +const t=e[0],i=n.substring(e.index),s=f(N,e,i);if(!s)return ee;const o=N +;N.endScope&&N.endScope._wrap?(g(), +u(t,N.endScope._wrap)):N.endScope&&N.endScope._multi?(g(), +d(N.endScope,e)):o.skip?R+=t:(o.returnEnd||o.excludeEnd||(R+=t), +g(),o.excludeEnd&&(R=t));do{ +N.scope&&M.closeNode(),N.skip||N.subLanguage||(j+=N.relevance),N=N.parent +}while(N!==s.parent);return s.starts&&h(s.starts,e),o.returnEnd?0:t.length} +let w={};function y(i,o){const a=o&&o[0];if(R+=i,null==a)return g(),0 +;if("begin"===w.type&&"end"===o.type&&w.index===o.index&&""===a){ +if(R+=n.slice(o.index,o.index+1),!r){const t=Error(`0 width match regex (${e})`) +;throw t.languageName=e,t.badRule=w.rule,t}return 1} +if(w=o,"begin"===o.type)return(e=>{ +const n=e[0],i=e.rule,s=new t(i),o=[i.__beforeBegin,i["on:begin"]] +;for(const t of o)if(t&&(t(e,s),s.isMatchIgnored))return b(n) +;return i.skip?R+=n:(i.excludeBegin&&(R+=n), +g(),i.returnBegin||i.excludeBegin||(R=n)),h(i,e),i.returnBegin?0:n.length})(o) +;if("illegal"===o.type&&!s){ +const e=Error('Illegal lexeme "'+a+'" for mode "'+(N.scope||"")+'"') +;throw e.mode=N,e}if("end"===o.type){const e=m(o);if(e!==ee)return e} +if("illegal"===o.type&&""===a)return 1 +;if(I>1e5&&I>3*o.index)throw Error("potential infinite loop, way more iterations than matches") +;return R+=a,a.length}const _=O(e) +;if(!_)throw W(a.replace("{}",e)),Error('Unknown language: "'+e+'"') +;const v=V(_);let k="",N=o||v;const S={},M=new p.__emitter(p);(()=>{const e=[] +;for(let t=N;t!==_;t=t.parent)t.scope&&e.unshift(t.scope) +;e.forEach((e=>M.openNode(e)))})();let R="",j=0,A=0,I=0,T=!1;try{ +if(_.__emitTokens)_.__emitTokens(n,M);else{for(N.matcher.considerAll();;){ +I++,T?T=!1:N.matcher.considerAll(),N.matcher.lastIndex=A +;const e=N.matcher.exec(n);if(!e)break;const t=y(n.substring(A,e.index),e) +;A=e.index+t}y(n.substring(A))}return M.finalize(),k=M.toHTML(),{language:e, +value:k,relevance:j,illegal:!1,_emitter:M,_top:N}}catch(t){ +if(t.message&&t.message.includes("Illegal"))return{language:e,value:Y(n), +illegal:!0,relevance:0,_illegalBy:{message:t.message,index:A, +context:n.slice(A-100,A+100),mode:t.mode,resultSoFar:k},_emitter:M};if(r)return{ +language:e,value:Y(n),illegal:!1,relevance:0,errorRaised:t,_emitter:M,_top:N} +;throw t}}function x(e,t){t=t||p.languages||Object.keys(i);const n=(e=>{ +const t={value:Y(e),illegal:!1,relevance:0,_top:l,_emitter:new p.__emitter(p)} +;return t._emitter.addText(e),t})(e),s=t.filter(O).filter(k).map((t=>E(t,e,!1))) +;s.unshift(n);const o=s.sort(((e,t)=>{ +if(e.relevance!==t.relevance)return t.relevance-e.relevance +;if(e.language&&t.language){if(O(e.language).supersetOf===t.language)return 1 +;if(O(t.language).supersetOf===e.language)return-1}return 0})),[r,a]=o,c=r +;return c.secondBest=a,c}function w(e){let t=null;const n=(e=>{ +let t=e.className+" ";t+=e.parentNode?e.parentNode.className:"" +;const n=p.languageDetectRe.exec(t);if(n){const t=O(n[1]) +;return t||(X(a.replace("{}",n[1])), +X("Falling back to no-highlight mode for this block.",e)),t?n[1]:"no-highlight"} +return t.split(/\s+/).find((e=>b(e)||O(e)))})(e);if(b(n))return +;if(N("before:highlightElement",{el:e,language:n +}),e.dataset.highlighted)return void console.log("Element previously highlighted. To highlight again, first unset `dataset.highlighted`.",e) +;if(e.children.length>0&&(p.ignoreUnescapedHTML||(console.warn("One of your code blocks includes unescaped HTML. This is a potentially serious security risk."), +console.warn("https://github.com/highlightjs/highlight.js/wiki/security"), +console.warn("The element with unescaped HTML:"), +console.warn(e)),p.throwUnescapedHTML))throw new J("One of your code blocks includes unescaped HTML.",e.innerHTML) +;t=e;const i=t.textContent,o=n?m(i,{language:n,ignoreIllegals:!0}):x(i) +;e.innerHTML=o.value,e.dataset.highlighted="yes",((e,t,n)=>{const i=t&&s[t]||n +;e.classList.add("hljs"),e.classList.add("language-"+i) +})(e,n,o.language),e.result={language:o.language,re:o.relevance, +relevance:o.relevance},o.secondBest&&(e.secondBest={ +language:o.secondBest.language,relevance:o.secondBest.relevance +}),N("after:highlightElement",{el:e,result:o,text:i})}let y=!1;function _(){ +"loading"!==document.readyState?document.querySelectorAll(p.cssSelector).forEach(w):y=!0 +}function O(e){return e=(e||"").toLowerCase(),i[e]||i[s[e]]} +function v(e,{languageName:t}){"string"==typeof e&&(e=[e]),e.forEach((e=>{ +s[e.toLowerCase()]=t}))}function k(e){const t=O(e) +;return t&&!t.disableAutodetect}function N(e,t){const n=e;o.forEach((e=>{ +e[n]&&e[n](t)}))} +"undefined"!=typeof window&&window.addEventListener&&window.addEventListener("DOMContentLoaded",(()=>{ +y&&_()}),!1),Object.assign(n,{highlight:m,highlightAuto:x,highlightAll:_, +highlightElement:w, +highlightBlock:e=>(G("10.7.0","highlightBlock will be removed entirely in v12.0"), +G("10.7.0","Please use highlightElement now."),w(e)),configure:e=>{p=Q(p,e)}, +initHighlighting:()=>{ +_(),G("10.6.0","initHighlighting() deprecated. Use highlightAll() now.")}, +initHighlightingOnLoad:()=>{ +_(),G("10.6.0","initHighlightingOnLoad() deprecated. Use highlightAll() now.") +},registerLanguage:(e,t)=>{let s=null;try{s=t(n)}catch(t){ +if(W("Language definition for '{}' could not be registered.".replace("{}",e)), +!r)throw t;W(t),s=l} +s.name||(s.name=e),i[e]=s,s.rawDefinition=t.bind(null,n),s.aliases&&v(s.aliases,{ +languageName:e})},unregisterLanguage:e=>{delete i[e] +;for(const t of Object.keys(s))s[t]===e&&delete s[t]}, +listLanguages:()=>Object.keys(i),getLanguage:O,registerAliases:v, +autoDetection:k,inherit:Q,addPlugin:e=>{(e=>{ +e["before:highlightBlock"]&&!e["before:highlightElement"]&&(e["before:highlightElement"]=t=>{ +e["before:highlightBlock"](Object.assign({block:t.el},t)) +}),e["after:highlightBlock"]&&!e["after:highlightElement"]&&(e["after:highlightElement"]=t=>{ +e["after:highlightBlock"](Object.assign({block:t.el},t))})})(e),o.push(e)}, +removePlugin:e=>{const t=o.indexOf(e);-1!==t&&o.splice(t,1)}}),n.debugMode=()=>{ +r=!1},n.safeMode=()=>{r=!0},n.versionString="11.10.0",n.regex={concat:h, +lookahead:g,either:f,optional:d,anyNumberOfTimes:u} +;for(const t in j)"object"==typeof j[t]&&e(j[t]);return Object.assign(n,j),n +},ne=te({});return ne.newInstance=()=>te({}),ne}() +;"object"==typeof exports&&"undefined"!=typeof module&&(module.exports=hljs); \ No newline at end of file diff --git a/render/templates/src/highlightjs/terraform.js b/render/templates/src/highlightjs/terraform.js new file mode 100644 index 0000000..179c119 --- /dev/null +++ b/render/templates/src/highlightjs/terraform.js @@ -0,0 +1,87 @@ +/* + * highlight.js terraform syntax highlighting definition + * + * @see https://github.com/highlightjs/highlight.js + * + * :TODO: + * + * @package: highlightjs-terraform + * @author: Nikos Tsirmirakis + * @since: 2019-03-20 + * + * Description: Terraform (HCL) language definition + * Category: scripting + */ + +var module = module ? module : {}; // shim for browser use + +function hljsDefineTerraform(hljs) { + var NUMBERS = { + className: 'number', + begin: '\\b\\d+(\\.\\d+)?', + relevance: 0 + }; + var STRINGS = { + className: 'string', + begin: '"', + end: '"', + contains: [{ + className: 'variable', + begin: '\\${', + end: '\\}', + relevance: 9, + contains: [{ + className: 'string', + begin: '"', + end: '"' + }, { + className: 'meta', + begin: '[A-Za-z_0-9]*' + '\\(', + end: '\\)', + contains: [ + NUMBERS, { + className: 'string', + begin: '"', + end: '"', + contains: [{ + className: 'variable', + begin: '\\${', + end: '\\}', + contains: [{ + className: 'string', + begin: '"', + end: '"', + contains: [{ + className: 'variable', + begin: '\\${', + end: '\\}' + }] + }, { + className: 'meta', + begin: '[A-Za-z_0-9]*' + '\\(', + end: '\\)' + }] + }] + }, + 'self'] + }] + }] + }; + + return { + aliases: ['tf', 'hcl'], + keywords: 'resource variable provider output locals module data terraform|10', + literal: 'false true null', + contains: [ + hljs.COMMENT('\\#', '$'), + NUMBERS, + STRINGS + ] + } +} + +module.exports = function (hljs) { + hljs.registerLanguage('terraform', hljsDefineTerraform); +}; + +module.exports.definer = hljsDefineTerraform; \ No newline at end of file diff --git a/render/testdata/golden/empty.html b/render/testdata/golden/empty.html index d5cab46..f31f7b4 100644 --- a/render/testdata/golden/empty.html +++ b/render/testdata/golden/empty.html @@ -4,493 +4,1342 @@ Trivy Report - + + +

Trivy Returned Empty Report

+ + + + + + + cy.resize() + } +}); + document.addEventListener('mouseup', () => { + isDragging = false; + document.body.style.userSelect = ''; +}); - - - -
-

Trivy Returned Empty Report

-

+ insertAfter(thead, tbody); + }; + tables.forEach((table, tableIx) => { + table.addEventListener("click", (e) => { + e.stopPropagation(); + const el = e.target; + const type = el.getAttribute("data-type"); + const sortable = el.getAttribute("data-sortable") === "true"; + if (el.nodeName !== "TH" || !sortable) return; + const cellIndex = el.cellIndex; + sortTable(tableIx, cellIndex, type, colIx === cellIndex); + colIx = colIx === cellIndex ? -1 : cellIndex; + }); + }); +} + +document.addEventListener("DOMContentLoaded", () => { + attachLinksInteractivity(); + attachSortInteractivity(); + attachFilterInteractivity(); +}); + \ No newline at end of file diff --git a/render/testdata/golden/graph.html b/render/testdata/golden/graph.html new file mode 100644 index 0000000..ebde7e8 --- /dev/null +++ b/render/testdata/golden/graph.html @@ -0,0 +1,1635 @@ + + + + + + Trivy Report + + + +

Trivy Report - log-storage +

+
+ +
+ +
+
+ + +
+ + + +
+
+
+
+
+
+ +
+ +
+

log-storage/modules/foo/modules/bar/modules/baz/main.tf

+
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Type + + + + Misconf ID + + + + Check + + + + Severity + + + + Message + + + +
Terraform Security Check AVD-AWS-0086S3 Access block should block public ACLHIGHNo public access block so not blocking public acls +
+ https://avd.aquasec.com/misconfig/avd-aws-0086 +
+
Terraform Security Check AVD-AWS-0087S3 Access block should block public policyHIGHNo public access block so not blocking public policies +
+ https://avd.aquasec.com/misconfig/avd-aws-0087 +
+
Terraform Security Check AVD-AWS-0088Unencrypted S3 bucket.HIGHBucket does not have encryption enabled +
+ https://avd.aquasec.com/misconfig/avd-aws-0088 +
+
Terraform Security Check s3-bucket-loggingS3 Bucket LoggingLOWBucket has logging disabled +
+ https://avd.aquasec.com/misconfig/s3-bucket-logging +
+
Terraform Security Check AVD-AWS-0090S3 Data should be versionedMEDIUMBucket does not have versioning enabled +
+ https://avd.aquasec.com/misconfig/avd-aws-0090 +
+
Terraform Security Check AVD-AWS-0091S3 Access Block should Ignore Public AclHIGHNo public access block so not blocking public acls +
+ https://avd.aquasec.com/misconfig/avd-aws-0091 +
+
Terraform Security Check AVD-AWS-0093S3 Access block should restrict public bucket to limit accessHIGHNo public access block so not restricting public buckets +
+ https://avd.aquasec.com/misconfig/avd-aws-0093 +
+
Terraform Security Check AVD-AWS-0094S3 buckets should each define an aws_s3_bucket_public_access_blockLOWBucket does not have a corresponding public access block. +
+ https://avd.aquasec.com/misconfig/avd-aws-0094 +
+
Terraform Security Check AVD-AWS-0132S3 encryption should use Customer Managed KeysHIGHBucket does not encrypt data with a customer managed key. +
+ https://avd.aquasec.com/misconfig/avd-aws-0132 +
+
+ +
+
+ +
+ + +
+
+
+ +
+
+ +
+

log-storage/modules/foo/modules/bar/modules/baz/main.tf

+
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Type + + + + Misconf ID + + + + Check + + + + Severity + + + + Message + + + +
Terraform Security Check AVD-AWS-0086S3 Access block should block public ACLHIGHNo public access block so not blocking public acls +
+ https://avd.aquasec.com/misconfig/avd-aws-0086 +
+
Terraform Security Check AVD-AWS-0086S3 Access block should block public ACLHIGHNo public access block so not blocking public acls +
+ https://avd.aquasec.com/misconfig/avd-aws-0086 +
+
+ +
+
+ +
+ + +
+
+
+ +
+
+ + + + + + + + \ No newline at end of file diff --git a/render/testdata/golden/happy-k8s.html b/render/testdata/golden/happy-k8s.html index 92d862e..d18bfed 100644 --- a/render/testdata/golden/happy-k8s.html +++ b/render/testdata/golden/happy-k8s.html @@ -4,17138 +4,19235 @@ Trivy Report - +#movable-window { + position: fixed; + top: 2%; + right: 3%; + width: 30%; + height: 50%; + background-color: #fff; + border: 1px solid #ccc; + box-shadow: 0 4px 8px rgba(0, 0, 0, 0.2); + z-index: 1000; + display: none; +} - - - - -
-

Trivy Report - ClusterRole/admin -

-
- -
-
-

ClusterRole/admin

-
- - - - - - - +.hljs-meta .hljs-string, .hljs-regexp, .hljs-string { + color: #032f62 +} - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV041Manage secretsCRITICALClusterRole 'admin' shouldn't have access to manage resource 'secrets' -
- https://avd.aquasec.com/misconfig/ksv041 -
-
Kubernetes Security CheckKSV041Manage secretsCRITICALClusterRole 'admin' shouldn't have access to manage resource 'secrets' -
- https://avd.aquasec.com/misconfig/ksv041 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'admin' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'admin' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'admin' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'admin' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'admin' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV049Manage configmapsMEDIUMClusterRole 'admin' should not have access to resource 'configmaps' for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv049 -
-
Kubernetes Security CheckKSV050Manage Kubernetes RBAC resourcesCRITICALClusterRole 'admin' should not have access to resources ["roles", "rolebindings"] for verbs ["create", "update", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv050 -
-
Kubernetes Security CheckKSV053Exec into PodsHIGHClusterRole 'admin' should not have access to resource '["pods/exec"]' for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv053 -
-
Kubernetes Security CheckKSV056Manage Kubernetes networkingHIGHClusterRole 'admin' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv056 -
-
Kubernetes Security CheckKSV056Manage Kubernetes networkingHIGHClusterRole 'admin' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv056 -
-
Kubernetes Security CheckKSV056Manage Kubernetes networkingHIGHClusterRole 'admin' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv056 -
-
-
-

ClusterRole/cluster-admin

-
- - - - - - - +.hljs-built_in, .hljs-symbol { + color: #e36209 +} - - - - - - - - - - - - - - - - - - - -
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV044No wildcard verb and resource rolesCRITICALRole permits wildcard verb on wildcard resource -
- https://avd.aquasec.com/misconfig/ksv044 -
-
Kubernetes Security CheckKSV046Manage all resourcesCRITICALClusterRole 'cluster-admin' shouldn't manage all resources -
- https://avd.aquasec.com/misconfig/ksv046 -
-
-
-

ClusterRole/edit

-
- - - - - - - +.hljs-code, .hljs-comment, .hljs-formula { + color: #6a737d +} - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV041Manage secretsCRITICALClusterRole 'edit' shouldn't have access to manage resource 'secrets' -
- https://avd.aquasec.com/misconfig/ksv041 -
-
Kubernetes Security CheckKSV041Manage secretsCRITICALClusterRole 'edit' shouldn't have access to manage resource 'secrets' -
- https://avd.aquasec.com/misconfig/ksv041 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'edit' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'edit' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'edit' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'edit' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'edit' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV049Manage configmapsMEDIUMClusterRole 'edit' should not have access to resource 'configmaps' for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv049 -
-
Kubernetes Security CheckKSV053Exec into PodsHIGHClusterRole 'edit' should not have access to resource '["pods/exec"]' for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv053 -
-
Kubernetes Security CheckKSV056Manage Kubernetes networkingHIGHClusterRole 'edit' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv056 -
-
Kubernetes Security CheckKSV056Manage Kubernetes networkingHIGHClusterRole 'edit' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv056 -
-
Kubernetes Security CheckKSV056Manage Kubernetes networkingHIGHClusterRole 'edit' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv056 -
-
-
-

ClusterRole/local-path-provisioner-role

-
- - - - - - - +.hljs-name, .hljs-quote, .hljs-selector-pseudo, .hljs-selector-tag { + color: #22863a +} - - - - - - - - - - - - - - - - - - - - - - - - - - -
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV045No wildcard verb rolesCRITICALRole permits wildcard verb on specific resources -
- https://avd.aquasec.com/misconfig/ksv045 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'local-path-provisioner-role' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV056Manage Kubernetes networkingHIGHClusterRole 'local-path-provisioner-role' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv056 -
-
-
-

ClusterRole/system:aggregate-to-admin

-
- - - - - - - +.hljs-subst { + color: #24292e +} - - - - - - - - - - - - -
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV050Manage Kubernetes RBAC resourcesCRITICALClusterRole 'system:aggregate-to-admin' should not have access to resources ["roles", "rolebindings"] for verbs ["create", "update", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv050 -
-
-
-

ClusterRole/system:aggregate-to-edit

-
- - - - - - - +.hljs-section { + color: #005cc5; + font-weight: 700 +} - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV041Manage secretsCRITICALClusterRole 'system:aggregate-to-edit' shouldn't have access to manage resource 'secrets' -
- https://avd.aquasec.com/misconfig/ksv041 -
-
Kubernetes Security CheckKSV041Manage secretsCRITICALClusterRole 'system:aggregate-to-edit' shouldn't have access to manage resource 'secrets' -
- https://avd.aquasec.com/misconfig/ksv041 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:aggregate-to-edit' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:aggregate-to-edit' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:aggregate-to-edit' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:aggregate-to-edit' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:aggregate-to-edit' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV049Manage configmapsMEDIUMClusterRole 'system:aggregate-to-edit' should not have access to resource 'configmaps' for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv049 -
-
Kubernetes Security CheckKSV053Exec into PodsHIGHClusterRole 'system:aggregate-to-edit' should not have access to resource '["pods/exec"]' for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv053 -
-
Kubernetes Security CheckKSV056Manage Kubernetes networkingHIGHClusterRole 'system:aggregate-to-edit' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv056 -
-
Kubernetes Security CheckKSV056Manage Kubernetes networkingHIGHClusterRole 'system:aggregate-to-edit' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv056 -
-
Kubernetes Security CheckKSV056Manage Kubernetes networkingHIGHClusterRole 'system:aggregate-to-edit' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv056 -
-
-
-

ClusterRole/system:controller:cronjob-controller

-
- - - - - - - +.hljs-bullet { + color: #735c0f +} - - - - - - - - - - - - - - - - - - - - - - - - - - -
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:cronjob-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:cronjob-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:cronjob-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
-
-

ClusterRole/system:controller:daemon-set-controller

-
- - - - - - - +.hljs-emphasis { + color: #24292e; + font-style: italic +} - - - - - - - - - - - - -
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:daemon-set-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
-
-

ClusterRole/system:controller:deployment-controller

-
- - - - - - - +.hljs-strong { + color: #24292e; + font-weight: 700 +} - - - - - - - - - - - - - - - - - - - - - - - - - - -
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:deployment-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:deployment-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:deployment-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
-
-

ClusterRole/system:controller:endpoint-controller

-
- - - - - - - +.hljs-addition { + color: #22863a; + background-color: #f0fff4 +} - - - - - - - - - - - - -
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV056Manage Kubernetes networkingHIGHClusterRole 'system:controller:endpoint-controller' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv056 -
-
-
-

ClusterRole/system:controller:endpointslice-controller

-
- - - - - - - +.hljs-deletion { + color: #b31d28; + background-color: #ffeef0 +} - - - - - - - - - - - - -
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV056Manage Kubernetes networkingHIGHClusterRole 'system:controller:endpointslice-controller' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv056 -
-
-
-

ClusterRole/system:controller:endpointslicemirroring-controller

-
- - - - - - - +pre code.hljs { + display: block; + overflow-x: auto; + padding: 1em +} - - - - - - - - - - - - -
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV056Manage Kubernetes networkingHIGHClusterRole 'system:controller:endpointslicemirroring-controller' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv056 -
-
-
-

ClusterRole/system:controller:expand-controller

-
- - - - - - - +code.hljs { + padding: 3px 5px +} + + + +

Trivy Report - ClusterRole/admin +

+
+ +
- - - - - - - - - - - - -
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV041Manage secretsCRITICALClusterRole 'system:controller:expand-controller' shouldn't have access to manage resource 'secrets' -
- https://avd.aquasec.com/misconfig/ksv041 -
-
-
-

ClusterRole/system:controller:generic-garbage-collector

-
- - - - - - - +
+
+ + +
+ -
- - - - - - - - - - - -
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV046Manage all resourcesCRITICALClusterRole 'system:controller:generic-garbage-collector' shouldn't manage all resources -
- https://avd.aquasec.com/misconfig/ksv046 -
-
-
-

ClusterRole/system:controller:horizontal-pod-autoscaler

+ +
- - - - - - - - - - - - - - - - - - - - - - - - - - - -
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV046Manage all resourcesCRITICALClusterRole 'system:controller:horizontal-pod-autoscaler' shouldn't manage all resources -
- https://avd.aquasec.com/misconfig/ksv046 -
-
Kubernetes Security CheckKSV046Manage all resourcesCRITICALClusterRole 'system:controller:horizontal-pod-autoscaler' shouldn't manage all resources -
- https://avd.aquasec.com/misconfig/ksv046 -
-
-
-

ClusterRole/system:controller:job-controller

+
+
- - - - - - - + - - - - - - - - - - - - - - - - - - - -
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:job-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:job-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
-
-

ClusterRole/system:controller:legacy-service-account-token-cleaner

-
- - - - - - - +
- - - - - - - - - - - - -
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV041Manage secretsCRITICALClusterRole 'system:controller:legacy-service-account-token-cleaner' shouldn't have access to manage resource 'secrets' -
- https://avd.aquasec.com/misconfig/ksv041 -
-
-
-

ClusterRole/system:controller:namespace-controller

-
- - - - - - - +
+

ClusterRole/admin

+
+
+
Type - - - - Misconf ID - - - - Check - - - - Severity - - - -
+ + + + + + - - - - - - - - - - - - -
Type + + + + Misconf ID + + + + Check + + + + Severity + + + + Message - - - -
Kubernetes Security CheckKSV046Manage all resourcesCRITICALClusterRole 'system:controller:namespace-controller' shouldn't manage all resources -
- https://avd.aquasec.com/misconfig/ksv046 -
-
-
-

ClusterRole/system:controller:node-controller

-
- - - - - - - + - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + -
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message + + + + Message - - - -
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:node-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security Check KSV041Manage secretsCRITICALClusterRole 'admin' shouldn't have access to manage resource 'secrets' +
+ https://avd.aquasec.com/misconfig/ksv041 +
+
Kubernetes Security Check KSV041Manage secretsCRITICALClusterRole 'admin' shouldn't have access to manage resource 'secrets' +
+ https://avd.aquasec.com/misconfig/ksv041 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'admin' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'admin' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'admin' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'admin' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'admin' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV049Manage configmapsMEDIUMClusterRole 'admin' should not have access to resource 'configmaps' for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv049 +
+
Kubernetes Security Check KSV050Manage Kubernetes RBAC resourcesCRITICALClusterRole 'admin' should not have access to resources ["roles", "rolebindings"] for verbs ["create", "update", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv050 +
+
Kubernetes Security Check KSV053Exec into PodsHIGHClusterRole 'admin' should not have access to resource '["pods/exec"]' for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv053 +
+
Kubernetes Security Check KSV056Manage Kubernetes networkingHIGHClusterRole 'admin' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv056 +
+
Kubernetes Security Check KSV056Manage Kubernetes networkingHIGHClusterRole 'admin' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv056 +
+
Kubernetes Security Check KSV056Manage Kubernetes networkingHIGHClusterRole 'admin' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv056 +
+
-
-

ClusterRole/system:controller:persistent-volume-binder

-
- - - - - -
Type - - - - Misconf ID - - - - Check - - +
+ +
+
+ +
+ + +
+
+
- Message - - - - - - - - - Kubernetes Security Check - KSV041 - Manage secrets - CRITICAL - ClusterRole 'system:controller:persistent-volume-binder' shouldn't have access to manage resource 'secrets' -
- https://avd.aquasec.com/misconfig/ksv041 -
- - - - Kubernetes Security Check - KSV048 - Manage Kubernetes workloads and pods - MEDIUM - ClusterRole 'system:controller:persistent-volume-binder' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
- - - - Kubernetes Security Check - KSV056 - Manage Kubernetes networking - HIGH - ClusterRole 'system:controller:persistent-volume-binder' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv056 -
- - - - Kubernetes Security Check - KSV056 - Manage Kubernetes networking - HIGH - ClusterRole 'system:controller:persistent-volume-binder' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv056 -
- - - - -
-

ClusterRole/system:controller:pod-garbage-collector

- - - - - - - + - - - - - - - - - - - +
+

ClusterRole/cluster-admin

+
+
+
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:pod-garbage-collector' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
+ + + + + + + + + + + + + + + + + + + + + + + + + + -
Type + + + + Misconf ID + + + + Check + + + + Severity + + + + Message + + + +
Kubernetes Security Check KSV044No wildcard verb and resource rolesCRITICALRole permits wildcard verb on wildcard resource +
+ https://avd.aquasec.com/misconfig/ksv044 +
+
Kubernetes Security Check KSV046Manage all resourcesCRITICALClusterRole 'cluster-admin' shouldn't manage all resources +
+ https://avd.aquasec.com/misconfig/ksv046 +
+
-
-

ClusterRole/system:controller:replicaset-controller

-
- - - - - -
Type - - - - Misconf ID - - - - Check - - +
+ +
+
+ +
+ + +
+
+
- Message - - - - - - - - - Kubernetes Security Check - KSV048 - Manage Kubernetes workloads and pods - MEDIUM - ClusterRole 'system:controller:replicaset-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
- - - - Kubernetes Security Check - KSV048 - Manage Kubernetes workloads and pods - MEDIUM - ClusterRole 'system:controller:replicaset-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
- - - - -
-

ClusterRole/system:controller:replication-controller

- - - - - - - + - - - - - - - - - - - - - - - - - - +
+

ClusterRole/edit

+
+
+
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:replication-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:replication-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + -
Type + + + + Misconf ID + + + + Check + + + + Severity + + + + Message + + + +
Kubernetes Security Check KSV041Manage secretsCRITICALClusterRole 'edit' shouldn't have access to manage resource 'secrets' +
+ https://avd.aquasec.com/misconfig/ksv041 +
+
Kubernetes Security Check KSV041Manage secretsCRITICALClusterRole 'edit' shouldn't have access to manage resource 'secrets' +
+ https://avd.aquasec.com/misconfig/ksv041 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'edit' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'edit' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'edit' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'edit' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'edit' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV049Manage configmapsMEDIUMClusterRole 'edit' should not have access to resource 'configmaps' for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv049 +
+
Kubernetes Security Check KSV053Exec into PodsHIGHClusterRole 'edit' should not have access to resource '["pods/exec"]' for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv053 +
+
Kubernetes Security Check KSV056Manage Kubernetes networkingHIGHClusterRole 'edit' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv056 +
+
Kubernetes Security Check KSV056Manage Kubernetes networkingHIGHClusterRole 'edit' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv056 +
+
Kubernetes Security Check KSV056Manage Kubernetes networkingHIGHClusterRole 'edit' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv056 +
+
-
-

ClusterRole/system:controller:resourcequota-controller

-
- - - - - -
Type - - - - Misconf ID - - - - Check - - +
+ +
+
+ +
+ + +
+
+
- Message - - - - - - - - - Kubernetes Security Check - KSV046 - Manage all resources - CRITICAL - ClusterRole 'system:controller:resourcequota-controller' shouldn't manage all resources -
- https://avd.aquasec.com/misconfig/ksv046 -
- - - - -
-

ClusterRole/system:controller:root-ca-cert-publisher

- - - - - - - + - - - - - - - - - - - +
+

ClusterRole/local-path-provisioner-role

+
+
+
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV049Manage configmapsMEDIUMClusterRole 'system:controller:root-ca-cert-publisher' should not have access to resource 'configmaps' for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv049 -
-
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + -
Type + + + + Misconf ID + + + + Check + + + + Severity + + + + Message + + + +
Kubernetes Security Check KSV045No wildcard verb rolesCRITICALRole permits wildcard verb on specific resources +
+ https://avd.aquasec.com/misconfig/ksv045 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'local-path-provisioner-role' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV056Manage Kubernetes networkingHIGHClusterRole 'local-path-provisioner-role' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv056 +
+
-
-

ClusterRole/system:controller:statefulset-controller

-
- - - - - -
Type - - - - Misconf ID - - - - Check - - +
+ +
+
+ +
+ + +
+
+
- Message - - - - - - - - - Kubernetes Security Check - KSV048 - Manage Kubernetes workloads and pods - MEDIUM - ClusterRole 'system:controller:statefulset-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
- - - - -
-

ClusterRole/system:controller:ttl-after-finished-controller

- - - - - - - + - - - - - - - - - - - +
+

ClusterRole/system:aggregate-to-admin

+
+
+
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:ttl-after-finished-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
+ + + + + + + + + + + + + + + + + + + -
Type + + + + Misconf ID + + + + Check + + + + Severity + + + + Message + + + +
Kubernetes Security Check KSV050Manage Kubernetes RBAC resourcesCRITICALClusterRole 'system:aggregate-to-admin' should not have access to resources ["roles", "rolebindings"] for verbs ["create", "update", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv050 +
+
-
-

ClusterRole/system:kube-controller-manager

-
- - - - - -
Type - - - - Misconf ID - - - - Check - - +
+ +
+
+ +
+ + +
+
+
- Message - - - - - - - - - Kubernetes Security Check - KSV041 - Manage secrets - CRITICAL - ClusterRole 'system:kube-controller-manager' shouldn't have access to manage resource 'secrets' -
- https://avd.aquasec.com/misconfig/ksv041 -
- - - - Kubernetes Security Check - KSV041 - Manage secrets - CRITICAL - ClusterRole 'system:kube-controller-manager' shouldn't have access to manage resource 'secrets' -
- https://avd.aquasec.com/misconfig/ksv041 -
- - - - Kubernetes Security Check - KSV041 - Manage secrets - CRITICAL - ClusterRole 'system:kube-controller-manager' shouldn't have access to manage resource 'secrets' -
- https://avd.aquasec.com/misconfig/ksv041 -
- - - - Kubernetes Security Check - KSV041 - Manage secrets - CRITICAL - ClusterRole 'system:kube-controller-manager' shouldn't have access to manage resource 'secrets' -
- https://avd.aquasec.com/misconfig/ksv041 -
- - - - Kubernetes Security Check - KSV046 - Manage all resources - CRITICAL - ClusterRole 'system:kube-controller-manager' shouldn't manage all resources -
- https://avd.aquasec.com/misconfig/ksv046 -
- - - - -
-

ClusterRole/system:kube-scheduler

- - - - - - - + - - - - - - - - - - - +
+

ClusterRole/system:aggregate-to-edit

+
+
+
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:kube-scheduler' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
-
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + -
Type + + + + Misconf ID + + + + Check + + + + Severity + + + + Message + + + +
Kubernetes Security Check KSV041Manage secretsCRITICALClusterRole 'system:aggregate-to-edit' shouldn't have access to manage resource 'secrets' +
+ https://avd.aquasec.com/misconfig/ksv041 +
+
Kubernetes Security Check KSV041Manage secretsCRITICALClusterRole 'system:aggregate-to-edit' shouldn't have access to manage resource 'secrets' +
+ https://avd.aquasec.com/misconfig/ksv041 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:aggregate-to-edit' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:aggregate-to-edit' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:aggregate-to-edit' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:aggregate-to-edit' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:aggregate-to-edit' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV049Manage configmapsMEDIUMClusterRole 'system:aggregate-to-edit' should not have access to resource 'configmaps' for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv049 +
+
Kubernetes Security Check KSV053Exec into PodsHIGHClusterRole 'system:aggregate-to-edit' should not have access to resource '["pods/exec"]' for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv053 +
+
Kubernetes Security Check KSV056Manage Kubernetes networkingHIGHClusterRole 'system:aggregate-to-edit' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv056 +
+
Kubernetes Security Check KSV056Manage Kubernetes networkingHIGHClusterRole 'system:aggregate-to-edit' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv056 +
+
Kubernetes Security Check KSV056Manage Kubernetes networkingHIGHClusterRole 'system:aggregate-to-edit' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv056 +
+
-
-

ClusterRole/system:node

-
- - - - - -
Type - - - - Misconf ID - - - - Check - - +
+ +
+
+ +
+ + +
+
+
- Message - - - - - - - - - Kubernetes Security Check - KSV041 - Manage secrets - CRITICAL - ClusterRole 'system:node' shouldn't have access to manage resource 'secrets' -
- https://avd.aquasec.com/misconfig/ksv041 -
- - - - Kubernetes Security Check - KSV048 - Manage Kubernetes workloads and pods - MEDIUM - ClusterRole 'system:node' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv048 -
- - - - -
-

ClusterRoleBinding/cluster-admin

- - - - - - - + + + +
- - - - - - - - - - - + + + +
+

ClusterRole/system:controller:deployment-controller

+
+
+
Type - - + + +
+

ClusterRole/system:controller:cronjob-controller

+
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Type + + + + Misconf ID + + + + Check + + + + Severity + + + + Message + + + +
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:cronjob-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:cronjob-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:cronjob-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
+ +
+
+ +
+
Misconf ID - - + + Check - - + + + +
+ + + + +
+

ClusterRole/system:controller:daemon-set-controller

+
+
+ + + + + + + + + + + + + + + + + + + + + +
Type + + + + Misconf ID + + + + Check + + + + Severity + + + + Message + + + +
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:daemon-set-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
+ +
+
+ +
+
Severity - - + + Message - - - -
Kubernetes Security CheckKSV111User with admin accessMEDIUMClusterRoleBinding 'cluster-admin' should not bind to roles ["cluster-admin", "admin", "edit"] -
- https://avd.aquasec.com/misconfig/ksv111 -
-
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + -
Type + + + + Misconf ID + + + + Check + + + + Severity + + + + Message + + + +
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:deployment-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:deployment-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:deployment-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
-
-

ClusterRoleBinding/kubeadm:cluster-admins

-
- - - - - - - +
Type - - - - Misconf ID - - - - Check - - - - Severity - - - -
- Message - - +
+
+ +
+ + +
+
+
- Message - - - - - - - - - Kubernetes Security Check - KSV113 - Manage namespace secrets - MEDIUM - Role 'system:controller:bootstrap-signer' shouldn't have access to manage secrets in namespace 'kube-system' -
- https://avd.aquasec.com/misconfig/ksv113 -
- - - - -
-

Role/system:controller:cloud-provider

- - - - - - - + - - - - - - - - - - - +
+

ClusterRole/system:controller:expand-controller

+
+
+
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV049Manage configmapsMEDIUMRole 'system:controller:cloud-provider' should not have access to resource 'configmaps' for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] -
- https://avd.aquasec.com/misconfig/ksv049 -
-
+ + + + + + + + + + + + + + + + + + + -
Type + + + + Misconf ID + + + + Check + + + + Severity + + + + Message + + + +
Kubernetes Security Check KSV041Manage secretsCRITICALClusterRole 'system:controller:expand-controller' shouldn't have access to manage resource 'secrets' +
+ https://avd.aquasec.com/misconfig/ksv041 +
+
-
-

Role/system:controller:token-cleaner

-
- - - - - -
Type - - - - Misconf ID - - - - Check - - +
+ +
+
+ +
+ + +
+
+
- Message - - - - - - - - - Kubernetes Security Check - KSV113 - Manage namespace secrets - MEDIUM - Role 'system:controller:token-cleaner' shouldn't have access to manage secrets in namespace 'kube-system' -
- https://avd.aquasec.com/misconfig/ksv113 -
- - - - -
-

Service/kube-dns

- - - - - - - + - - - - - - - - - - - +
+

ClusterRole/system:controller:generic-garbage-collector

+
+
+
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Kubernetes Security CheckKSV037User Pods should not be placed in kube-system namespaceMEDIUMService 'kube-dns' should not be set with 'kube-system' namespace -
- https://avd.aquasec.com/misconfig/ksv037 -
-
+ + + + + + + + + + + + + + + + + + + -
Type + + + + Misconf ID + + + + Check + + + + Severity + + + + Message + + + +
Kubernetes Security Check KSV046Manage all resourcesCRITICALClusterRole 'system:controller:generic-garbage-collector' shouldn't manage all resources +
+ https://avd.aquasec.com/misconfig/ksv046 +
+
-
-

Deployment/local-path-provisioner

-
- - - - - -
Type - - - - Misconf ID - - - - Check - - +
+ +
+
+ +
+ + +
+
+
- Message - - - - - - - - - Kubernetes Security Check - KSV001 - Can elevate its own privileges - MEDIUM - Container 'local-path-provisioner' of Deployment 'local-path-provisioner' should set 'securityContext.allowPrivilegeEscalation' to false -
- https://avd.aquasec.com/misconfig/ksv001 -
- - - - Kubernetes Security Check - KSV003 - Default capabilities: some containers do not drop all - LOW - Container 'local-path-provisioner' of Deployment 'local-path-provisioner' should add 'ALL' to 'securityContext.capabilities.drop' -
- https://avd.aquasec.com/misconfig/ksv003 -
- - - - Kubernetes Security Check - KSV011 - CPU not limited - LOW - Container 'local-path-provisioner' of Deployment 'local-path-provisioner' should set 'resources.limits.cpu' -
- https://avd.aquasec.com/misconfig/ksv011 -
- - - - Kubernetes Security Check - KSV012 - Runs as root user - MEDIUM - Container 'local-path-provisioner' of Deployment 'local-path-provisioner' should set 'securityContext.runAsNonRoot' to true -
- https://avd.aquasec.com/misconfig/ksv012 -
- - - - Kubernetes Security Check - KSV014 - Root file system is not read-only - HIGH - Container 'local-path-provisioner' of Deployment 'local-path-provisioner' should set 'securityContext.readOnlyRootFilesystem' to true -
- https://avd.aquasec.com/misconfig/ksv014 -
- - - - Kubernetes Security Check - KSV015 - CPU requests not specified - LOW - Container 'local-path-provisioner' of Deployment 'local-path-provisioner' should set 'resources.requests.cpu' -
- https://avd.aquasec.com/misconfig/ksv015 -
- - - - Kubernetes Security Check - KSV016 - Memory requests not specified - LOW - Container 'local-path-provisioner' of Deployment 'local-path-provisioner' should set 'resources.requests.memory' -
- https://avd.aquasec.com/misconfig/ksv016 -
- - - - Kubernetes Security Check - KSV018 - Memory not limited - LOW - Container 'local-path-provisioner' of Deployment 'local-path-provisioner' should set 'resources.limits.memory' -
- https://avd.aquasec.com/misconfig/ksv018 -
- - - - Kubernetes Security Check - KSV020 - Runs with UID <= 10000 - LOW - Container 'local-path-provisioner' of Deployment 'local-path-provisioner' should set 'securityContext.runAsUser' > 10000 -
- https://avd.aquasec.com/misconfig/ksv020 -
- - - - Kubernetes Security Check - KSV021 - Runs with GID <= 10000 - LOW - Container 'local-path-provisioner' of Deployment 'local-path-provisioner' should set 'securityContext.runAsGroup' > 10000 -
- https://avd.aquasec.com/misconfig/ksv021 -
- - - - Kubernetes Security Check - KSV030 - Runtime/Default Seccomp profile not set - LOW - Either Pod or Container should set 'securityContext.seccompProfile.type' to 'RuntimeDefault' -
- https://avd.aquasec.com/misconfig/ksv030 -
- - - - Kubernetes Security Check - KSV104 - Seccomp policies disabled - MEDIUM - container "local-path-provisioner" of deployment "local-path-provisioner" in "local-path-storage" namespace should specify a seccomp profile -
- https://avd.aquasec.com/misconfig/ksv104 -
- - - - Kubernetes Security Check - KSV106 - Container capabilities must only include NET_BIND_SERVICE - LOW - container should drop all -
- https://avd.aquasec.com/misconfig/ksv106 -
- - - - -
-

registry.k8s.io/coredns/coredns:v1.11.3 (debian 11.10)

- + + +
+

ClusterRole/system:controller:horizontal-pod-autoscaler

+
+
+
- - - - - - + - - - - - - - - - + + + + + + - + + + + + + + +
Package + Type Vulnerability ID - + Misconf ID + Severity + Check Installed Version - - - - Fixed Version - + Severity + Links + + Message
tzdataDLA-3972-1UNKNOWN2024a-0+deb11u12024b-0+deb11u1
Kubernetes Security Check KSV046Manage all resourcesCRITICALClusterRole 'system:controller:horizontal-pod-autoscaler' shouldn't manage all resources +
+ https://avd.aquasec.com/misconfig/ksv046 +
Kubernetes Security Check KSV046Manage all resourcesCRITICALClusterRole 'system:controller:horizontal-pod-autoscaler' shouldn't manage all resources +
+ https://avd.aquasec.com/misconfig/ksv046 +
+
-
-

Packages

+ +
+
+ +
+ + +
+
+
+
+
- +
+

ClusterRole/system:controller:job-controller

+
+
+
- - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + - + + + + + + + +
ID + Type Name - + Misconf ID + Version + Check SrcName - + Severity + SrcVersion - + + Message +
base-files@11.1+deb11u10base-files11.1+deb11u10base-files11.1+deb11u10
netbase@6.3netbase6.3netbase6.3
tzdata@2024a-0+deb11u1tzdata2024atzdata2024a
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:job-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:job-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
-
-

coredns

+ +
+
+ +
+ + +
+
+
+
- + + +
+

ClusterRole/system:controller:legacy-service-account-token-cleaner

+
+
+
- - - - - - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + - +
Package + Type Vulnerability ID - + Misconf ID + Severity + Check Installed Version - - - - Fixed Version - + Severity + Links + + Message
github.com/golang-jwt/jwt/v4CVE-2024-51744LOWv4.5.04.5.1
github.com/quic-go/quic-goCVE-2024-53259MEDIUMv0.44.00.48.2
stdlibCVE-2024-34156HIGHv1.21.111.22.7, 1.23.1
stdlibCVE-2024-24791MEDIUMv1.21.111.21.12, 1.22.5
stdlibCVE-2024-34155MEDIUMv1.21.111.22.7, 1.23.1
stdlibCVE-2024-34158MEDIUMv1.21.111.22.7, 1.23.1
Kubernetes Security Check KSV041Manage secretsCRITICALClusterRole 'system:controller:legacy-service-account-token-cleaner' shouldn't have access to manage resource 'secrets' +
+ https://avd.aquasec.com/misconfig/ksv041 +
-
-

Packages

+ +
+
+ +
+ + +
+
+
+
+
- +
+

ClusterRole/system:controller:namespace-controller

+
+
+
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + - +
ID + Type Name - + Misconf ID + Version + Check SrcName - + Severity + SrcVersion - + + Message +
github.com/coredns/coredns
stdlibv1.21.11
cloud.google.com/go/compute/metadatav0.2.3
github.com/Azure/azure-sdk-for-gov68.0.0+incompatible
github.com/Azure/go-autorest/autorestv0.11.29
github.com/Azure/go-autorest/autorest/adalv0.9.22
github.com/Azure/go-autorest/autorest/azure/authv0.5.13
github.com/Azure/go-autorest/autorest/azure/cliv0.4.6
github.com/Azure/go-autorest/autorest/datev0.3.0
github.com/Azure/go-autorest/autorest/tov0.2.0
github.com/Azure/go-autorest/loggerv0.2.1
github.com/Azure/go-autorest/tracingv0.6.0
github.com/DataDog/appsec-internal-gov1.5.0
github.com/DataDog/datadog-agent/pkg/obfuscatev0.48.0
github.com/DataDog/datadog-agent/pkg/remoteconfig/statev0.48.1
github.com/DataDog/datadog-go/v5v5.3.0
github.com/DataDog/go-libddwaf/v2v2.4.2
github.com/DataDog/go-tufv1.0.2-0.5.2
github.com/DataDog/sketches-gov1.4.2
github.com/antonmedv/exprv1.15.5
github.com/apparentlymart/go-cidrv1.1.0
github.com/aws/aws-sdk-gov1.54.11
github.com/beorn7/perksv1.0.1
github.com/cespare/xxhash/v2v2.2.0
github.com/coredns/caddyv1.1.1
github.com/coreos/go-semverv0.3.0
github.com/coreos/go-systemd/v22v22.3.2
github.com/davecgh/go-spewv1.1.2-0.20180830191138-d8f796af33cc
github.com/dimchansky/utfbomv1.1.1
github.com/dnstap/golang-dnstapv0.4.0
github.com/dustin/go-humanizev1.0.1
github.com/emicklei/go-restful/v3v3.11.0
github.com/farsightsec/golang-framestreamv0.3.0
github.com/felixge/httpsnoopv1.0.4
github.com/flynn/go-shlexv0.0.0-20150515145356-3f9db97f8568
github.com/go-logr/logrv1.4.1
github.com/go-logr/stdrv1.2.2
github.com/go-openapi/jsonpointerv0.19.6
github.com/go-openapi/jsonreferencev0.20.2
github.com/go-openapi/swagv0.22.3
github.com/gogo/protobufv1.3.2
github.com/golang-jwt/jwt/v4v4.5.0
github.com/golang/groupcachev0.0.0-20210331224755-41bb18bfe9da
github.com/golang/protobufv1.5.4
github.com/google/gnostic-modelsv0.6.8
github.com/google/go-cmpv0.6.0
github.com/google/gofuzzv1.2.0
github.com/google/s2a-gov0.1.7
github.com/google/uuidv1.6.0
github.com/googleapis/enterprise-certificate-proxyv0.3.2
github.com/googleapis/gax-go/v2v2.12.3
github.com/grpc-ecosystem/grpc-opentracingv0.0.0-20180507213350-8e809c8a8645
github.com/hashicorp/errwrapv1.1.0
github.com/hashicorp/go-multierrorv1.1.1
github.com/imdario/mergov0.3.12
github.com/infobloxopen/go-treesv0.0.0-20200715205103-96a057b8dfb9
github.com/jmespath/go-jmespathv0.4.0
github.com/josharian/internv1.0.0
github.com/json-iterator/gov1.1.12
github.com/mailru/easyjsonv0.7.7
github.com/matttproud/golang_protobuf_extensionsv1.0.4
github.com/miekg/dnsv1.1.59
github.com/mitchellh/go-homedirv1.1.0
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.2
github.com/munnerz/goautonegv0.0.0-20191010083416-a7dc8b61c822
github.com/opentracing-contrib/go-observerv0.0.0-20170622124052-a52f23424492
github.com/opentracing/opentracing-gov1.2.0
github.com/openzipkin-contrib/zipkin-go-opentracingv0.5.0
github.com/openzipkin/zipkin-gov0.4.3
github.com/oschwald/geoip2-golangv1.9.0
github.com/oschwald/maxminddb-golangv1.11.0
github.com/outcaste-io/ristrettov0.2.3
github.com/philhofer/fwdv1.1.2
github.com/pkg/errorsv0.9.1
github.com/prometheus/client_golangv1.19.1
github.com/prometheus/client_modelv0.6.1
github.com/prometheus/commonv0.53.0
github.com/prometheus/procfsv0.12.0
github.com/quic-go/quic-gov0.44.0
github.com/secure-systems-lab/go-securesystemslibv0.7.0
github.com/spf13/pflagv1.0.5
github.com/tinylib/msgpv1.1.8
go.etcd.io/etcd/api/v3v3.5.13
go.etcd.io/etcd/client/pkg/v3v3.5.13
go.etcd.io/etcd/client/v3v3.5.13
go.opencensus.iov0.24.0
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttpv0.49.0
go.opentelemetry.io/otelv1.24.0
go.opentelemetry.io/otel/metricv1.24.0
go.opentelemetry.io/otel/tracev1.24.0
go.uber.org/atomicv1.11.0
go.uber.org/multierrv1.6.0
go.uber.org/zapv1.17.0
golang.org/x/cryptov0.23.0
golang.org/x/expv0.0.0-20240506185415-9bf2ced13842
golang.org/x/netv0.25.0
golang.org/x/oauth2v0.18.0
golang.org/x/sysv0.20.0
golang.org/x/termv0.20.0
golang.org/x/textv0.15.0
golang.org/x/timev0.5.0
golang.org/x/xerrorsv0.0.0-20220907171357-04be3eba64a2
google.golang.org/apiv0.172.0
google.golang.org/genproto/googleapis/apiv0.0.0-20240311132316-a219d84964c2
google.golang.org/genproto/googleapis/rpcv0.0.0-20240415180920-8c6c420018be
google.golang.org/grpcv1.63.2
google.golang.org/protobufv1.33.0
gopkg.in/DataDog/dd-trace-go.v1v1.64.0
gopkg.in/inf.v0v0.9.1
gopkg.in/yaml.v2v2.4.0
gopkg.in/yaml.v3v3.0.1
k8s.io/apiv0.29.3
k8s.io/apimachineryv0.29.3
k8s.io/client-gov0.29.3
k8s.io/klog/v2v2.120.1
k8s.io/kube-openapiv0.0.0-20231010175941-2dd684a91f00
k8s.io/utilsv0.0.0-20230726121419-3b25d923346b
sigs.k8s.io/jsonv0.0.0-20221116044647-bc3834ca7abd
sigs.k8s.io/structured-merge-diff/v4v4.4.1
sigs.k8s.io/yamlv1.3.0
Kubernetes Security Check KSV046Manage all resourcesCRITICALClusterRole 'system:controller:namespace-controller' shouldn't manage all resources +
+ https://avd.aquasec.com/misconfig/ksv046 +
+
-
-

usr/local/bin/kube-scheduler

+ +
+
+ +
+ + +
+
+
+
- + + +
+

ClusterRole/system:controller:node-controller

+
+
+
- - - - - - + - - - - - + + + + + + - - - - +
Package + Type Vulnerability ID - + Misconf ID + Severity + Check Installed Version - - - - Fixed Version - + Severity + Links + + Message
github.com/opencontainers/runcCVE-2024-45310
Kubernetes Security Check KSV048Manage Kubernetes workloads and pods MEDIUMv1.1.131.1.14, 1.2.0-rc.3ClusterRole 'system:controller:node-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
-
-

Packages

+ +
+
+ +
+ + +
+
+
+
+
- +
+

ClusterRole/system:controller:persistent-volume-binder

+
+
+
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + - + + + + + + + + + + + + + + +
ID + Type Name - + Misconf ID + Version + Check SrcName - + Severity + SrcVersion - + + Message +
k8s.io/kubernetes
stdlibv1.22.8
github.com/NYTimes/gziphandlerv1.1.1
github.com/antlr4-go/antlr/v4v4.13.0
github.com/asaskevich/govalidatorv0.0.0-20190424111038-f61b66f89f4a
github.com/beorn7/perksv1.0.1
github.com/blang/semver/v4v4.0.0
github.com/cenkalti/backoff/v4v4.3.0
github.com/cespare/xxhash/v2v2.3.0
github.com/coreos/go-semverv0.3.1
github.com/coreos/go-systemd/v22v22.5.0
github.com/davecgh/go-spewv1.1.2-0.20180830191138-d8f796af33cc
github.com/distribution/referencev0.5.0
github.com/emicklei/go-restful/v3v3.11.0
github.com/felixge/httpsnoopv1.0.4
github.com/fsnotify/fsnotifyv1.7.0
github.com/fxamacker/cbor/v2v2.7.0
github.com/go-logr/logrv1.4.2
github.com/go-logr/stdrv1.2.2
github.com/go-logr/zaprv1.3.0
github.com/go-openapi/jsonpointerv0.19.6
github.com/go-openapi/jsonreferencev0.20.2
github.com/go-openapi/swagv0.22.4
github.com/gogo/protobufv1.3.2
github.com/golang/groupcachev0.0.0-20210331224755-41bb18bfe9da
github.com/golang/protobufv1.5.4
github.com/google/cel-gov0.20.1
github.com/google/gnostic-modelsv0.6.8
github.com/google/go-cmpv0.6.0
github.com/google/gofuzzv1.2.0
github.com/google/uuidv1.6.0
github.com/grpc-ecosystem/go-grpc-prometheusv1.2.0
github.com/grpc-ecosystem/grpc-gateway/v2v2.20.0
github.com/imdario/mergov0.3.6
github.com/josharian/internv1.0.0
github.com/json-iterator/gov1.1.12
github.com/mailru/easyjsonv0.7.7
github.com/moby/sys/mountinfov0.7.1
github.com/moby/termv0.5.0
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.2
github.com/munnerz/goautonegv0.0.0-20191010083416-a7dc8b61c822
github.com/opencontainers/go-digestv1.0.0
github.com/opencontainers/runcv1.1.13
github.com/opencontainers/selinuxv1.11.0
github.com/pkg/errorsv0.9.1
github.com/prometheus/client_golangv1.19.1
github.com/prometheus/client_modelv0.6.1
github.com/prometheus/commonv0.55.0
github.com/prometheus/procfsv0.15.1
github.com/spf13/cobrav1.8.1
github.com/spf13/pflagv1.0.5
github.com/stoewer/go-strcasev1.2.0
github.com/x448/float16v0.8.4
go.etcd.io/etcd/api/v3v3.5.14
go.etcd.io/etcd/client/pkg/v3v3.5.14
go.etcd.io/etcd/client/v3v3.5.14
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpcv0.53.0
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttpv0.53.0
go.opentelemetry.io/otelv1.28.0
go.opentelemetry.io/otel/exporters/otlp/otlptracev1.28.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpcv1.27.0
go.opentelemetry.io/otel/metricv1.28.0
go.opentelemetry.io/otel/sdkv1.28.0
go.opentelemetry.io/otel/tracev1.28.0
go.opentelemetry.io/proto/otlpv1.3.1
go.uber.org/multierrv1.11.0
go.uber.org/zapv1.26.0
golang.org/x/cryptov0.24.0
golang.org/x/expv0.0.0-20230515195305-f3d0a9c9a5cc
golang.org/x/netv0.26.0
golang.org/x/oauth2v0.21.0
golang.org/x/syncv0.7.0
golang.org/x/sysv0.21.0
golang.org/x/termv0.21.0
golang.org/x/textv0.16.0
golang.org/x/timev0.3.0
google.golang.org/genproto/googleapis/apiv0.0.0-20240528184218-531527333157
google.golang.org/genproto/googleapis/rpcv0.0.0-20240701130421-f6361c86f094
google.golang.org/grpcv1.65.0
google.golang.org/protobufv1.34.2
gopkg.in/evanphx/json-patch.v4v4.12.0
gopkg.in/inf.v0v0.9.1
gopkg.in/natefinch/lumberjack.v2v2.2.1
gopkg.in/yaml.v2v2.4.0
gopkg.in/yaml.v3v3.0.1
k8s.io/api
k8s.io/apiextensions-apiserver
k8s.io/apimachinery
k8s.io/apiserver
k8s.io/client-go
k8s.io/cloud-provider
k8s.io/component-base
k8s.io/component-helpers
k8s.io/controller-manager
k8s.io/csi-translation-lib
k8s.io/dynamic-resource-allocation
k8s.io/klog/v2v2.130.1
k8s.io/kms
k8s.io/kube-openapiv0.0.0-20240228011516-70dd3763d340
k8s.io/kube-scheduler
k8s.io/kubelet
k8s.io/mount-utils
k8s.io/utilsv0.0.0-20240711033017-18e509b52bc8
sigs.k8s.io/apiserver-network-proxy/konnectivity-clientv0.30.3
sigs.k8s.io/jsonv0.0.0-20221116044647-bc3834ca7abd
sigs.k8s.io/structured-merge-diff/v4v4.4.1
sigs.k8s.io/yamlv1.4.0
Kubernetes Security Check KSV041Manage secretsCRITICALClusterRole 'system:controller:persistent-volume-binder' shouldn't have access to manage resource 'secrets' +
+ https://avd.aquasec.com/misconfig/ksv041 +
+
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:persistent-volume-binder' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
Kubernetes Security Check KSV056Manage Kubernetes networkingHIGHClusterRole 'system:controller:persistent-volume-binder' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv056 +
+
Kubernetes Security Check KSV056Manage Kubernetes networkingHIGHClusterRole 'system:controller:persistent-volume-binder' should not have access to resources ["services", "endpoints", "endpointslices", "networkpolicies", "ingresses"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv056 +
+
-
-

docker.io/kindest/kindnetd:v20241023-a345ebe4 (debian 12.5)

+ +
+
+ +
+ + +
+
+
+
- + + +
+

ClusterRole/system:controller:pod-garbage-collector

+
+
+
- - - - - - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + - - - - - - - - - - + +
Package + Type Vulnerability ID - + Misconf ID + Severity + Check Installed Version - - - - Fixed Version - + Severity + Links + + Message
coreutilsCVE-2016-2781LOW9.1-1
coreutilsCVE-2017-18018LOW9.1-1
iptablesCVE-2012-2663LOW1.8.9-2
libc6CVE-2010-4756LOW2.36-9+deb12u7
libc6CVE-2018-20796LOW2.36-9+deb12u7
libc6CVE-2019-1010022LOW2.36-9+deb12u7
libc6CVE-2019-1010023LOW2.36-9+deb12u7
libc6CVE-2019-1010024LOW2.36-9+deb12u7
libc6CVE-2019-1010025LOW2.36-9+deb12u7
libc6CVE-2019-9192LOW2.36-9+deb12u7
libip4tc2CVE-2012-2663LOW1.8.9-2
libip6tc2CVE-2012-2663LOW1.8.9-2
libjansson4CVE-2020-36325LOW2.14-2
libssl3CVE-2023-5678MEDIUM3.0.11-1~deb12u23.0.13-1~deb12u1
libssl3CVE-2023-6129
Kubernetes Security Check KSV048Manage Kubernetes workloads and pods MEDIUM3.0.11-1~deb12u23.0.13-1~deb12u1ClusterRole 'system:controller:pod-garbage-collector' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
libssl3CVE-2023-6237MEDIUM3.0.11-1~deb12u23.0.13-1~deb12u1
+ +
+
+ +
+ + +
+
+
+ +
+
+ +
+

ClusterRole/system:controller:replicaset-controller

+
+
+ + + + + + + + + + - - - + + + + + + - - - - - - + + + + - - - - - - - - - - + +
Type + + + + Misconf ID + + + + Check + + + + Severity + + + + Message + + + +
libssl3CVE-2024-0727
Kubernetes Security Check KSV048Manage Kubernetes workloads and pods MEDIUM3.0.11-1~deb12u23.0.13-1~deb12u1ClusterRole 'system:controller:replicaset-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
libssl3CVE-2024-4603
Kubernetes Security Check KSV048Manage Kubernetes workloads and pods MEDIUM3.0.11-1~deb12u23.0.14-1~deb12u1ClusterRole 'system:controller:replicaset-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
libssl3CVE-2024-4741MEDIUM3.0.11-1~deb12u23.0.14-1~deb12u1
+ +
+
+ +
+ + +
+
+
+ +
+
+ +
+

ClusterRole/system:controller:replication-controller

+
+
+ + + + + + + + + + - - - + + + + + + - - - - - - + + + + - - - - - - - - - - - - - - - - - - + +
Type + + + + Misconf ID + + + + Check + + + + Severity + + + + Message + + + +
libssl3CVE-2024-5535
Kubernetes Security Check KSV048Manage Kubernetes workloads and pods MEDIUM3.0.11-1~deb12u23.0.15-1~deb12u1ClusterRole 'system:controller:replication-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
libssl3CVE-2024-6119
Kubernetes Security Check KSV048Manage Kubernetes workloads and pods MEDIUM3.0.11-1~deb12u23.0.14-1~deb12u2
libssl3CVE-2024-2511LOW3.0.11-1~deb12u23.0.14-1~deb12u1ClusterRole 'system:controller:replication-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
libssl3CVE-2024-9143LOW3.0.11-1~deb12u23.0.15-1~deb12u1
+ +
+
+ +
+ + +
+
+
+ +
+
+ +
+

ClusterRole/system:controller:resourcequota-controller

+
+
+ + + + + + + + + + - - - - - - - + + + + + + + - +
Type + + + + Misconf ID + + + + Check + + + + Severity + + + + Message + + + +
libxtables12CVE-2012-2663LOW1.8.9-2
Kubernetes Security Check KSV046Manage all resourcesCRITICALClusterRole 'system:controller:resourcequota-controller' shouldn't manage all resources +
+ https://avd.aquasec.com/misconfig/ksv046 +
-
-

Packages

+ +
+
+ +
+ + +
+
+
+
+
- +
+

ClusterRole/system:controller:root-ca-cert-publisher

+
+
+
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + - +
ID + Type Name - + Misconf ID + Version + Check SrcName - + Severity + SrcVersion - + + Message +
base-files@12.4+deb12u5base-files12.4+deb12u5base-files12.4+deb12u5
conntrack@1:1.4.7-1+b2conntrack1.4.7conntrack-tools1.4.7
coreutils@9.1-1coreutils9.1coreutils9.1
ebtables@2.0.11-5ebtables2.0.11ebtables2.0.11
ipset@7.17-1ipset7.17ipset7.17
iptables@1.8.9-2iptables1.8.9iptables1.8.9
kmod@30+20221128-1kmod30+20221128kmod30+20221128
libbsd0@0.11.7-2libbsd00.11.7libbsd0.11.7
libc6@2.36-9+deb12u7libc62.36glibc2.36
libedit2@3.1-20221030-2libedit23.1-20221030libedit3.1-20221030
libgmp10@2:6.2.1+dfsg1-1.1libgmp106.2.1+dfsg1gmp6.2.1+dfsg1
libip4tc2@1.8.9-2libip4tc21.8.9iptables1.8.9
libip6tc2@1.8.9-2libip6tc21.8.9iptables1.8.9
libipset13@7.17-1libipset137.17ipset7.17
libjansson4@2.14-2libjansson42.14jansson2.14
libkmod2@30+20221128-1libkmod230+20221128kmod30+20221128
libmd0@1.0.4-2libmd01.0.4libmd1.0.4
libmnl0@1.0.4-3libmnl01.0.4libmnl1.0.4
libnetfilter-conntrack3@1.0.9-3libnetfilter-conntrack31.0.9libnetfilter-conntrack1.0.9
libnfnetlink0@1.0.2-2libnfnetlink01.0.2libnfnetlink1.0.2
libnftables1@1.0.6-2+deb12u2libnftables11.0.6nftables1.0.6
libnftnl11@1.2.4-2libnftnl111.2.4libnftnl1.2.4
libpcre2-8-0@10.42-1libpcre2-8-010.42pcre210.42
libssl3@3.0.11-1~deb12u2libssl33.0.11openssl3.0.11
libxtables12@1.8.9-2libxtables121.8.9iptables1.8.9
libzstd1@1.5.4+dfsg2-5libzstd11.5.4+dfsg2libzstd1.5.4+dfsg2
netbase@6.4netbase6.4netbase6.4
nftables@1.0.6-2+deb12u2nftables1.0.6nftables1.0.6
tzdata@2024a-0+deb12u1tzdata2024atzdata2024a
Kubernetes Security Check KSV049Manage configmapsMEDIUMClusterRole 'system:controller:root-ca-cert-publisher' should not have access to resource 'configmaps' for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv049 +
+
-
-

bin/kindnetd

+ +
+
+ +
+ + +
+
+
+
- + + +
+

ClusterRole/system:controller:statefulset-controller

+
+
+
- - - - - - + - - - - - - - - - - - - - - - - - - - - - + + + + + + - - - - +
Package + Type Vulnerability ID - + Misconf ID + Severity + Check Installed Version - - - - Fixed Version - + Severity + Links + + Message
stdlibCVE-2024-34156HIGHv1.22.61.22.7, 1.23.1
stdlibCVE-2024-34155MEDIUMv1.22.61.22.7, 1.23.1
stdlibCVE-2024-34158
Kubernetes Security Check KSV048Manage Kubernetes workloads and pods MEDIUMv1.22.61.22.7, 1.23.1ClusterRole 'system:controller:statefulset-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
-
-

Packages

+ +
+
+ +
+ + +
+
+
+
+
- +
+

ClusterRole/system:controller:ttl-after-finished-controller

+
+
+
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + - +
ID + Type Name - + Misconf ID + Version + Check SrcName - + Severity + SrcVersion - + + Message +
sigs.k8s.io/kind/images/kindnetd
stdlibv1.22.6
github.com/beorn7/perksv1.0.1
github.com/cespare/xxhash/v2v2.3.0
github.com/coreos/go-iptablesv0.8.0
github.com/davecgh/go-spewv1.1.2-0.20180830191138-d8f796af33cc
github.com/emicklei/go-restful/v3v3.12.1
github.com/florianl/go-nfqueuev1.3.2
github.com/fxamacker/cbor/v2v2.7.0
github.com/go-logr/logrv1.4.2
github.com/go-openapi/jsonpointerv0.21.0
github.com/go-openapi/jsonreferencev0.21.0
github.com/go-openapi/swagv0.23.0
github.com/gogo/protobufv1.3.2
github.com/golang/groupcachev0.0.0-20210331224755-41bb18bfe9da
github.com/golang/protobufv1.5.4
github.com/google/gnostic-modelsv0.6.8
github.com/google/go-cmpv0.6.0
github.com/google/gofuzzv1.2.0
github.com/google/uuidv1.6.0
github.com/josharian/internv1.0.0
github.com/josharian/nativev1.1.0
github.com/json-iterator/gov1.1.12
github.com/mailru/easyjsonv0.7.7
github.com/mdlayher/netlinkv1.7.2
github.com/mdlayher/socketv0.5.1
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.2
github.com/munnerz/goautonegv0.0.0-20191010083416-a7dc8b61c822
github.com/prometheus/client_golangv1.20.5
github.com/prometheus/client_modelv0.6.1
github.com/prometheus/commonv0.60.0
github.com/prometheus/procfsv0.15.1
github.com/vishvananda/netlinkv1.3.0
github.com/vishvananda/netnsv0.0.4
github.com/x448/float16v0.8.4
golang.org/x/netv0.30.0
golang.org/x/oauth2v0.23.0
golang.org/x/syncv0.8.0
golang.org/x/sysv0.26.0
golang.org/x/termv0.25.0
golang.org/x/textv0.19.0
golang.org/x/timev0.7.0
google.golang.org/protobufv1.35.1
gopkg.in/inf.v0v0.9.1
gopkg.in/yaml.v2v2.4.0
gopkg.in/yaml.v3v3.0.1
k8s.io/apiv0.31.1
k8s.io/apimachineryv0.31.1
k8s.io/client-gov0.31.1
k8s.io/klog/v2v2.130.1
k8s.io/kube-openapiv0.0.0-20240903163716-9e1beecbcb38
k8s.io/utilsv0.0.0-20240921022957-49e7df575cb6
sigs.k8s.io/jsonv0.0.0-20221116044647-bc3834ca7abd
sigs.k8s.io/knftablesv0.0.17
sigs.k8s.io/kube-network-policiesv0.6.1-0.20241023163654-4320aa92e3f0
sigs.k8s.io/network-policy-apiv0.1.5
sigs.k8s.io/structured-merge-diff/v4v4.4.1
sigs.k8s.io/yamlv1.4.0
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:controller:ttl-after-finished-controller' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
-
-

go-runner

+ +
+
+ +
+ + +
+
+
+
- + + +
+

ClusterRole/system:kube-controller-manager

+
+
+
- - - - - - + - - - - - - - - - + + + + + + - - - - - - - + + + + + - - - - - - - + + + + + - - - - - - - + + + + + - + + + + + + + +
Package + Type Vulnerability ID - + Misconf ID + Severity + Check Installed Version - - - - Fixed Version - + Severity + Links + + Message
stdlibCVE-2024-34156HIGHv1.22.41.22.7, 1.23.1
Kubernetes Security Check KSV041Manage secretsCRITICALClusterRole 'system:kube-controller-manager' shouldn't have access to manage resource 'secrets' +
+ https://avd.aquasec.com/misconfig/ksv041 +
stdlibCVE-2024-24791MEDIUMv1.22.41.21.12, 1.22.5
Kubernetes Security Check KSV041Manage secretsCRITICALClusterRole 'system:kube-controller-manager' shouldn't have access to manage resource 'secrets' +
+ https://avd.aquasec.com/misconfig/ksv041 +
stdlibCVE-2024-34155MEDIUMv1.22.41.22.7, 1.23.1
Kubernetes Security Check KSV041Manage secretsCRITICALClusterRole 'system:kube-controller-manager' shouldn't have access to manage resource 'secrets' +
+ https://avd.aquasec.com/misconfig/ksv041 +
stdlibCVE-2024-34158MEDIUMv1.22.41.22.7, 1.23.1
Kubernetes Security Check KSV041Manage secretsCRITICALClusterRole 'system:kube-controller-manager' shouldn't have access to manage resource 'secrets' +
+ https://avd.aquasec.com/misconfig/ksv041 +
Kubernetes Security Check KSV046Manage all resourcesCRITICALClusterRole 'system:kube-controller-manager' shouldn't manage all resources +
+ https://avd.aquasec.com/misconfig/ksv046 +
+
-
-

Packages

+ +
+
+ +
+ + +
+
+
+
+
- +
+

ClusterRole/system:kube-scheduler

+
+
+
- - - - - - - - - - - - - - - - - - - - + + + + + + + + - +
ID + Type Name - + Misconf ID + Version + Check SrcName - + Severity + SrcVersion - + + Message +
k8s.io/release/images/build/go-runner
stdlibv1.22.4
Kubernetes Security Check KSV048Manage Kubernetes workloads and podsMEDIUMClusterRole 'system:kube-scheduler' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
+
-
-

registry.k8s.io/kube-proxy:v1.31.2 (debian 12.7)

+ +
+
+ +
+ + +
+
+
+
- + + +
+

ClusterRole/system:node

+
+
+
- - - - - - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + - - - + + + + - - - - - - - - - - - - - - - - - - - - +
Package + Type Vulnerability ID - + Misconf ID + Severity + Check Installed Version - - - - Fixed Version - + Severity + Links + + Message
coreutilsCVE-2016-2781LOW9.1-1
coreutilsCVE-2017-18018LOW9.1-1
iptablesCVE-2012-2663LOW1.8.9-2
libc6CVE-2010-4756LOW2.36-9+deb12u8
libc6CVE-2018-20796LOW2.36-9+deb12u8
libc6CVE-2019-1010022LOW2.36-9+deb12u8
libc6CVE-2019-1010023LOW2.36-9+deb12u8
libc6CVE-2019-1010024LOW2.36-9+deb12u8
libc6CVE-2019-1010025LOW2.36-9+deb12u8
libc6CVE-2019-9192LOW2.36-9+deb12u8
libip4tc2CVE-2012-2663LOW1.8.9-2
libip6tc2CVE-2012-2663LOW1.8.9-2
libjansson4CVE-2020-36325LOW2.14-2
Kubernetes Security Check KSV041Manage secretsCRITICALClusterRole 'system:node' shouldn't have access to manage resource 'secrets' +
+ https://avd.aquasec.com/misconfig/ksv041 +
libssl3CVE-2024-5535
Kubernetes Security Check KSV048Manage Kubernetes workloads and pods MEDIUM3.0.14-1~deb12u23.0.15-1~deb12u1
libssl3CVE-2024-9143LOW3.0.14-1~deb12u23.0.15-1~deb12u1ClusterRole 'system:node' should not have access to resources ["pods", "deployments", "jobs", "cronjobs", "statefulsets", "daemonsets", "replicasets", "replicationcontrollers"] for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv048 +
libxtables12CVE-2012-2663LOW1.8.9-2
-
-

Packages

+ +
+
+ +
+ + +
+
+
+
+
- +
+

ClusterRoleBinding/cluster-admin

+
+
+
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + - +
ID + Type Name - + Misconf ID + Version + Check SrcName - + Severity + SrcVersion - + + Message +
base-files@12.4+deb12u7base-files12.4+deb12u7base-files12.4+deb12u7
conntrack@1:1.4.7-1+b2conntrack1.4.7conntrack-tools1.4.7
coreutils@9.1-1coreutils9.1coreutils9.1
ebtables@2.0.11-5ebtables2.0.11ebtables2.0.11
ipset@7.17-1ipset7.17ipset7.17
iptables@1.8.9-2iptables1.8.9iptables1.8.9
kmod@30+20221128-1kmod30+20221128kmod30+20221128
libbsd0@0.11.7-2libbsd00.11.7libbsd0.11.7
libc6@2.36-9+deb12u8libc62.36glibc2.36
libedit2@3.1-20221030-2libedit23.1-20221030libedit3.1-20221030
libgmp10@2:6.2.1+dfsg1-1.1libgmp106.2.1+dfsg1gmp6.2.1+dfsg1
libip4tc2@1.8.9-2libip4tc21.8.9iptables1.8.9
libip6tc2@1.8.9-2libip6tc21.8.9iptables1.8.9
libipset13@7.17-1libipset137.17ipset7.17
libjansson4@2.14-2libjansson42.14jansson2.14
libkmod2@30+20221128-1libkmod230+20221128kmod30+20221128
libmd0@1.0.4-2libmd01.0.4libmd1.0.4
libmnl0@1.0.4-3libmnl01.0.4libmnl1.0.4
libnetfilter-conntrack3@1.0.9-3libnetfilter-conntrack31.0.9libnetfilter-conntrack1.0.9
libnfnetlink0@1.0.2-2libnfnetlink01.0.2libnfnetlink1.0.2
libnftables1@1.0.6-2+deb12u2libnftables11.0.6nftables1.0.6
libnftnl11@1.2.4-2libnftnl111.2.4libnftnl1.2.4
libpcre2-8-0@10.42-1libpcre2-8-010.42pcre210.42
libssl3@3.0.14-1~deb12u2libssl33.0.14openssl3.0.14
libxtables12@1.8.9-2libxtables121.8.9iptables1.8.9
libzstd1@1.5.4+dfsg2-5libzstd11.5.4+dfsg2libzstd1.5.4+dfsg2
netbase@6.4netbase6.4netbase6.4
nftables@1.0.6-2+deb12u2nftables1.0.6nftables1.0.6
tzdata@2024a-0+deb12u1tzdata2024atzdata2024a
Kubernetes Security Check KSV111User with admin accessMEDIUMClusterRoleBinding 'cluster-admin' should not bind to roles ["cluster-admin", "admin", "edit"] +
+ https://avd.aquasec.com/misconfig/ksv111 +
+
-
-

usr/local/bin/kube-proxy

+ +
+
+ +
+ + +
+
+
+
- + + +
+

ClusterRoleBinding/kubeadm:cluster-admins

+
+
+
- - - - - - + - - - - - + + + + + + - - - - +
Package + Type Vulnerability ID - + Misconf ID + Severity + Check Installed Version - - - - Fixed Version - + Severity + Links + + Message
github.com/opencontainers/runcCVE-2024-45310
Kubernetes Security Check KSV111User with admin access MEDIUMv1.1.131.1.14, 1.2.0-rc.3ClusterRoleBinding 'kubeadm:cluster-admins' should not bind to roles ["cluster-admin", "admin", "edit"] +
+ https://avd.aquasec.com/misconfig/ksv111 +
-
-

Packages

+ +
+
+ +
+ + +
+
+
+
+
- +
+

NodeInfo/kind-control-plane

+
+
+
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + + + + + + + + + + + + + + + - + + + + + + + + + + + + + + +
ID + Type Name - + Misconf ID + Version + Check SrcName - + Severity + SrcVersion - + + Message +
k8s.io/kubernetes
stdlibv1.22.8
github.com/NYTimes/gziphandlerv1.1.1
github.com/antlr4-go/antlr/v4v4.13.0
github.com/asaskevich/govalidatorv0.0.0-20190424111038-f61b66f89f4a
github.com/beorn7/perksv1.0.1
github.com/blang/semver/v4v4.0.0
github.com/cenkalti/backoff/v4v4.3.0
github.com/cespare/xxhash/v2v2.3.0
github.com/coreos/go-semverv0.3.1
github.com/coreos/go-systemd/v22v22.5.0
github.com/cyphar/filepath-securejoinv0.2.4
github.com/davecgh/go-spewv1.1.2-0.20180830191138-d8f796af33cc
github.com/distribution/referencev0.5.0
github.com/emicklei/go-restful/v3v3.11.0
github.com/felixge/httpsnoopv1.0.4
github.com/fsnotify/fsnotifyv1.7.0
github.com/fxamacker/cbor/v2v2.7.0
github.com/go-logr/logrv1.4.2
github.com/go-logr/stdrv1.2.2
github.com/go-logr/zaprv1.3.0
github.com/go-openapi/jsonpointerv0.19.6
github.com/go-openapi/jsonreferencev0.20.2
github.com/go-openapi/swagv0.22.4
github.com/godbus/dbus/v5v5.1.0
github.com/gogo/protobufv1.3.2
github.com/golang/groupcachev0.0.0-20210331224755-41bb18bfe9da
github.com/golang/protobufv1.5.4
github.com/google/cadvisorv0.49.0
github.com/google/cel-gov0.20.1
github.com/google/gnostic-modelsv0.6.8
github.com/google/go-cmpv0.6.0
github.com/google/gofuzzv1.2.0
github.com/google/uuidv1.6.0
github.com/grpc-ecosystem/go-grpc-prometheusv1.2.0
github.com/grpc-ecosystem/grpc-gateway/v2v2.20.0
github.com/imdario/mergov0.3.6
github.com/josharian/internv1.0.0
github.com/json-iterator/gov1.1.12
github.com/lithammer/dedentv1.1.0
github.com/mailru/easyjsonv0.7.7
github.com/mistifyio/go-zfsv2.1.2-0.20190413222219-f784269be439+incompatible
github.com/moby/ipvsv1.1.0
github.com/moby/sys/mountinfov0.7.1
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.2
github.com/munnerz/goautonegv0.0.0-20191010083416-a7dc8b61c822
github.com/opencontainers/go-digestv1.0.0
github.com/opencontainers/runcv1.1.13
github.com/opencontainers/runtime-specv1.0.3-0.20220909204839-494a5a6aca78
github.com/pkg/errorsv0.9.1
github.com/prometheus/client_golangv1.19.1
github.com/prometheus/client_modelv0.6.1
github.com/prometheus/commonv0.55.0
github.com/prometheus/procfsv0.15.1
github.com/sirupsen/logrusv1.9.3
github.com/spf13/cobrav1.8.1
github.com/spf13/pflagv1.0.5
github.com/stoewer/go-strcasev1.2.0
github.com/vishvananda/netlinkv1.1.0
github.com/vishvananda/netnsv0.0.4
github.com/x448/float16v0.8.4
go.etcd.io/etcd/api/v3v3.5.14
go.etcd.io/etcd/client/pkg/v3v3.5.14
go.etcd.io/etcd/client/v3v3.5.14
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpcv0.53.0
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttpv0.53.0
go.opentelemetry.io/otelv1.28.0
go.opentelemetry.io/otel/exporters/otlp/otlptracev1.28.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpcv1.27.0
go.opentelemetry.io/otel/metricv1.28.0
go.opentelemetry.io/otel/sdkv1.28.0
go.opentelemetry.io/otel/tracev1.28.0
go.opentelemetry.io/proto/otlpv1.3.1
go.uber.org/multierrv1.11.0
go.uber.org/zapv1.26.0
golang.org/x/cryptov0.24.0
golang.org/x/expv0.0.0-20230515195305-f3d0a9c9a5cc
golang.org/x/netv0.26.0
golang.org/x/oauth2v0.21.0
golang.org/x/syncv0.7.0
golang.org/x/sysv0.21.0
golang.org/x/termv0.21.0
golang.org/x/textv0.16.0
golang.org/x/timev0.3.0
google.golang.org/genproto/googleapis/apiv0.0.0-20240528184218-531527333157
google.golang.org/genproto/googleapis/rpcv0.0.0-20240701130421-f6361c86f094
google.golang.org/grpcv1.65.0
google.golang.org/protobufv1.34.2
gopkg.in/evanphx/json-patch.v4v4.12.0
gopkg.in/inf.v0v0.9.1
gopkg.in/natefinch/lumberjack.v2v2.2.1
gopkg.in/yaml.v2v2.4.0
gopkg.in/yaml.v3v3.0.1
k8s.io/api
k8s.io/apiextensions-apiserver
k8s.io/apimachinery
k8s.io/apiserver
k8s.io/client-go
k8s.io/cloud-provider
k8s.io/component-base
k8s.io/component-helpers
k8s.io/controller-manager
k8s.io/cri-api
k8s.io/cri-client
k8s.io/klog/v2v2.130.1
k8s.io/kms
k8s.io/kube-openapiv0.0.0-20240228011516-70dd3763d340
k8s.io/kube-proxy
k8s.io/kubelet
k8s.io/mount-utils
k8s.io/utilsv0.0.0-20240711033017-18e509b52bc8
sigs.k8s.io/apiserver-network-proxy/konnectivity-clientv0.30.3
sigs.k8s.io/jsonv0.0.0-20221116044647-bc3834ca7abd
sigs.k8s.io/knftablesv0.0.17
sigs.k8s.io/structured-merge-diff/v4v4.4.1
sigs.k8s.io/yamlv1.4.0
Kubernetes Security Check KCV0056Ensure that the container network interface file permissions are set to 600 or more restrictiveHIGHEnsure that the Container Network Interface specification file permissions is set to 600 or more restrictive +
+ https://avd.aquasec.com/misconfig/kcv0056 +
+
Kubernetes Security Check KCV0059Ensure that the etcd data directory ownership is set to etcd:etcdLOWEnsure that the etcd data directory ownership is set to etcd:etcd +
+ https://avd.aquasec.com/misconfig/kcv0059 +
+
Kubernetes Security Check KCV0069Ensure that the kubelet service file permissions are set to 600 or more restrictiveHIGHEnsure that the kubelet service file permissions are set to 600 or more restrictive +
+ https://avd.aquasec.com/misconfig/kcv0069 +
+
Kubernetes Security Check KCV0075Ensure that the certificate authorities file permissions are set to 600 or more restrictiveCRITICALEnsure that the certificate authorities file permissions are set to 600 or more restrictive +
+ https://avd.aquasec.com/misconfig/kcv0075 +
+
Kubernetes Security Check KCV0077If the kubelet config.yaml configuration file is being used validate permissions set to 600 or more restrictiveHIGHEnsure that if the kubelet refers to a configuration file with the --config argument, that file has permissions of 600 or more restrictive. +
+ https://avd.aquasec.com/misconfig/kcv0077 +
+
-
-

usr/local/bin/kube-apiserver

+ +
+
+ +
+ + +
+
+
+
- + + +
+

Role/system:controller:bootstrap-signer

+
+
+
- - - - - - + - - - - - - - - - - - - - + + + + + + - - - - +
Package + Type Vulnerability ID - + Misconf ID + Severity + Check Installed Version - - - - Fixed Version - + Severity + Links + + Message
github.com/opencontainers/runcCVE-2024-45310MEDIUMv1.1.131.1.14, 1.2.0-rc.3
gopkg.in/square/go-jose.v2CVE-2024-28180
Kubernetes Security Check KSV049Manage configmaps MEDIUMv2.6.0Role 'system:controller:bootstrap-signer' should not have access to resource 'configmaps' for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv049 +
-
-

Packages

+ +
+
+ +
+ + +
+
+
+
+
- +
+

RoleBinding/kubeadm:bootstrap-signer-clusterinfo

+
+
+
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + - +
ID + Type Name - + Misconf ID + Version + Check SrcName - + Severity + SrcVersion - + + Message +
k8s.io/kubernetes
stdlibv1.22.8
github.com/NYTimes/gziphandlerv1.1.1
github.com/antlr4-go/antlr/v4v4.13.0
github.com/asaskevich/govalidatorv0.0.0-20190424111038-f61b66f89f4a
github.com/beorn7/perksv1.0.1
github.com/blang/semver/v4v4.0.0
github.com/cenkalti/backoff/v4v4.3.0
github.com/cespare/xxhash/v2v2.3.0
github.com/coreos/go-oidcv2.2.1+incompatible
github.com/coreos/go-semverv0.3.1
github.com/coreos/go-systemd/v22v22.5.0
github.com/davecgh/go-spewv1.1.2-0.20180830191138-d8f796af33cc
github.com/distribution/referencev0.5.0
github.com/emicklei/go-restful/v3v3.11.0
github.com/felixge/httpsnoopv1.0.4
github.com/fsnotify/fsnotifyv1.7.0
github.com/fxamacker/cbor/v2v2.7.0
github.com/go-logr/logrv1.4.2
github.com/go-logr/stdrv1.2.2
github.com/go-logr/zaprv1.3.0
github.com/go-openapi/jsonpointerv0.19.6
github.com/go-openapi/jsonreferencev0.20.2
github.com/go-openapi/swagv0.22.4
github.com/gogo/protobufv1.3.2
github.com/golang/groupcachev0.0.0-20210331224755-41bb18bfe9da
github.com/golang/protobufv1.5.4
github.com/google/cel-gov0.20.1
github.com/google/gnostic-modelsv0.6.8
github.com/google/go-cmpv0.6.0
github.com/google/gofuzzv1.2.0
github.com/google/uuidv1.6.0
github.com/gorilla/websocketv1.5.0
github.com/grpc-ecosystem/go-grpc-prometheusv1.2.0
github.com/grpc-ecosystem/grpc-gateway/v2v2.20.0
github.com/imdario/mergov0.3.6
github.com/josharian/internv1.0.0
github.com/json-iterator/gov1.1.12
github.com/mailru/easyjsonv0.7.7
github.com/moby/spdystreamv0.4.0
github.com/moby/sys/mountinfov0.7.1
github.com/moby/termv0.5.0
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.2
github.com/munnerz/goautonegv0.0.0-20191010083416-a7dc8b61c822
github.com/mxk/go-flowratev0.0.0-20140419014527-cca7078d478f
github.com/opencontainers/go-digestv1.0.0
github.com/opencontainers/runcv1.1.13
github.com/opencontainers/selinuxv1.11.0
github.com/pkg/errorsv0.9.1
github.com/pquerna/cachecontrolv0.1.0
github.com/prometheus/client_golangv1.19.1
github.com/prometheus/client_modelv0.6.1
github.com/prometheus/commonv0.55.0
github.com/prometheus/procfsv0.15.1
github.com/robfig/cron/v3v3.0.1
github.com/spf13/cobrav1.8.1
github.com/spf13/pflagv1.0.5
github.com/stoewer/go-strcasev1.2.0
github.com/x448/float16v0.8.4
go.etcd.io/etcd/api/v3v3.5.14
go.etcd.io/etcd/client/pkg/v3v3.5.14
go.etcd.io/etcd/client/v3v3.5.14
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpcv0.53.0
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttpv0.53.0
go.opentelemetry.io/otelv1.28.0
go.opentelemetry.io/otel/exporters/otlp/otlptracev1.28.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpcv1.27.0
go.opentelemetry.io/otel/metricv1.28.0
go.opentelemetry.io/otel/sdkv1.28.0
go.opentelemetry.io/otel/tracev1.28.0
go.opentelemetry.io/proto/otlpv1.3.1
go.uber.org/multierrv1.11.0
go.uber.org/zapv1.26.0
golang.org/x/cryptov0.24.0
golang.org/x/expv0.0.0-20230515195305-f3d0a9c9a5cc
golang.org/x/netv0.26.0
golang.org/x/oauth2v0.21.0
golang.org/x/syncv0.7.0
golang.org/x/sysv0.21.0
golang.org/x/termv0.21.0
golang.org/x/textv0.16.0
golang.org/x/timev0.3.0
golang.org/x/toolsv0.21.1-0.20240508182429-e35e4ccd0d2d
google.golang.org/genproto/googleapis/apiv0.0.0-20240528184218-531527333157
google.golang.org/genproto/googleapis/rpcv0.0.0-20240701130421-f6361c86f094
google.golang.org/grpcv1.65.0
google.golang.org/protobufv1.34.2
gopkg.in/evanphx/json-patch.v4v4.12.0
gopkg.in/inf.v0v0.9.1
gopkg.in/natefinch/lumberjack.v2v2.2.1
gopkg.in/square/go-jose.v2v2.6.0
gopkg.in/yaml.v2v2.4.0
gopkg.in/yaml.v3v3.0.1
k8s.io/api
k8s.io/apiextensions-apiserver
k8s.io/apimachinery
k8s.io/apiserver
k8s.io/client-go
k8s.io/cloud-provider
k8s.io/cluster-bootstrap
k8s.io/component-base
k8s.io/component-helpers
k8s.io/controller-manager
k8s.io/dynamic-resource-allocation
k8s.io/klog/v2v2.130.1
k8s.io/kms
k8s.io/kube-aggregator
k8s.io/kube-openapiv0.0.0-20240228011516-70dd3763d340
k8s.io/kubelet
k8s.io/mount-utils
k8s.io/pod-security-admission
k8s.io/utilsv0.0.0-20240711033017-18e509b52bc8
sigs.k8s.io/apiserver-network-proxy/konnectivity-clientv0.30.3
sigs.k8s.io/jsonv0.0.0-20221116044647-bc3834ca7abd
sigs.k8s.io/structured-merge-diff/v4v4.4.1
sigs.k8s.io/yamlv1.4.0
Kubernetes Security Check KSV122Anonymous user access bindingCRITICALRoleBinding 'kubeadm:bootstrap-signer-clusterinfo' should not bind to roles ["system:unauthenticated", "system:anonymous"] +
+ https://avd.aquasec.com/misconfig/ksv122 +
+
-
-

usr/local/bin/kube-controller-manager

+ +
+
+ +
+ + +
+
+
+
- + + +
+

ConfigMap/extension-apiserver-authentication

+
+
+
- - - - - - + - - - - - - - - - - - - - + + + + + + - - - - +
Package + Type Vulnerability ID - + Misconf ID + Severity + Check Installed Version - - - - Fixed Version - + Severity + Links + + Message
github.com/opencontainers/runcCVE-2024-45310MEDIUMv1.1.131.1.14, 1.2.0-rc.3
gopkg.in/square/go-jose.v2CVE-2024-28180
Kubernetes Security Check AVD-KSV-01010ConfigMap with sensitive content MEDIUMv2.6.0ConfigMap 'extension-apiserver-authentication' in 'kube-system' namespace stores sensitive contents in key(s) or value(s) '{"requestheader-username-headers"}' +
+ https://avd.aquasec.com/misconfig/avd-ksv-01010 +
-
-

Packages

+ +
+
+ +
+ + +
+
+
+
+
- +
+

DaemonSet/kindnet

+
+
+
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ID + Type Name - + Misconf ID + Version + Check SrcName - + Severity + SrcVersion - + + Message +
k8s.io/kubernetes
stdlibv1.22.8
github.com/NYTimes/gziphandlerv1.1.1
github.com/antlr4-go/antlr/v4v4.13.0
github.com/asaskevich/govalidatorv0.0.0-20190424111038-f61b66f89f4a
github.com/beorn7/perksv1.0.1
github.com/blang/semver/v4v4.0.0
github.com/cenkalti/backoff/v4v4.3.0
github.com/cespare/xxhash/v2v2.3.0
github.com/checkpoint-restore/go-criu/v5v5.3.0
github.com/cilium/ebpfv0.9.1
github.com/container-storage-interface/specv1.9.0
github.com/containerd/consolev1.0.3
github.com/containerd/ttrpcv1.2.2
github.com/coreos/go-oidcv2.2.1+incompatible
github.com/coreos/go-semverv0.3.1
github.com/coreos/go-systemd/v22v22.5.0
github.com/cyphar/filepath-securejoinv0.2.4
github.com/davecgh/go-spewv1.1.2-0.20180830191138-d8f796af33cc
github.com/distribution/referencev0.5.0
github.com/docker/go-unitsv0.5.0
github.com/emicklei/go-restful/v3v3.11.0
github.com/euank/go-kmsg-parserv2.0.0+incompatible
github.com/felixge/httpsnoopv1.0.4
github.com/fsnotify/fsnotifyv1.7.0
github.com/fxamacker/cbor/v2v2.7.0
github.com/go-logr/logrv1.4.2
github.com/go-logr/stdrv1.2.2
github.com/go-logr/zaprv1.3.0
github.com/go-openapi/jsonpointerv0.19.6
github.com/go-openapi/jsonreferencev0.20.2
github.com/go-openapi/swagv0.22.4
github.com/godbus/dbus/v5v5.1.0
github.com/gogo/protobufv1.3.2
github.com/golang/groupcachev0.0.0-20210331224755-41bb18bfe9da
github.com/golang/protobufv1.5.4
github.com/google/cadvisorv0.49.0
github.com/google/cel-gov0.20.1
github.com/google/gnostic-modelsv0.6.8
github.com/google/go-cmpv0.6.0
github.com/google/gofuzzv1.2.0
github.com/google/uuidv1.6.0
github.com/gorilla/websocketv1.5.0
github.com/grpc-ecosystem/go-grpc-prometheusv1.2.0
github.com/grpc-ecosystem/grpc-gateway/v2v2.20.0
github.com/imdario/mergov0.3.6
github.com/josharian/internv1.0.0
github.com/json-iterator/gov1.1.12
github.com/karrick/godirwalkv1.17.0
github.com/libopenstorage/openstoragev1.0.0
github.com/mailru/easyjsonv0.7.7
github.com/mistifyio/go-zfsv2.1.2-0.20190413222219-f784269be439+incompatible
github.com/moby/spdystreamv0.4.0
github.com/moby/sys/mountinfov0.7.1
github.com/moby/termv0.5.0
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.2
github.com/mohae/deepcopyv0.0.0-20170603005431-491d3605edfb
github.com/mrunalp/fileutilsv0.5.1
github.com/munnerz/goautonegv0.0.0-20191010083416-a7dc8b61c822
github.com/mxk/go-flowratev0.0.0-20140419014527-cca7078d478f
github.com/opencontainers/go-digestv1.0.0
github.com/opencontainers/runcv1.1.13
github.com/opencontainers/runtime-specv1.0.3-0.20220909204839-494a5a6aca78
github.com/opencontainers/selinuxv1.11.0
github.com/pkg/errorsv0.9.1
github.com/pquerna/cachecontrolv0.1.0
github.com/prometheus/client_golangv1.19.1
github.com/prometheus/client_modelv0.6.1
github.com/prometheus/commonv0.55.0
github.com/prometheus/procfsv0.15.1
github.com/robfig/cron/v3v3.0.1
github.com/sirupsen/logrusv1.9.3
github.com/spf13/cobrav1.8.1
github.com/spf13/pflagv1.0.5
github.com/stoewer/go-strcasev1.2.0
github.com/syndtr/gocapabilityv0.0.0-20200815063812-42c35b437635
github.com/vishvananda/netlinkv1.1.0
github.com/vishvananda/netnsv0.0.4
github.com/x448/float16v0.8.4
go.etcd.io/etcd/api/v3v3.5.14
go.etcd.io/etcd/client/pkg/v3v3.5.14
go.etcd.io/etcd/client/v3v3.5.14
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpcv0.53.0
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttpv0.53.0
go.opentelemetry.io/otelv1.28.0
go.opentelemetry.io/otel/exporters/otlp/otlptracev1.28.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpcv1.27.0
go.opentelemetry.io/otel/metricv1.28.0
go.opentelemetry.io/otel/sdkv1.28.0
go.opentelemetry.io/otel/tracev1.28.0
go.opentelemetry.io/proto/otlpv1.3.1
go.uber.org/multierrv1.11.0
go.uber.org/zapv1.26.0
golang.org/x/cryptov0.24.0
golang.org/x/expv0.0.0-20230515195305-f3d0a9c9a5cc
golang.org/x/netv0.26.0
golang.org/x/oauth2v0.21.0
golang.org/x/syncv0.7.0
golang.org/x/sysv0.21.0
golang.org/x/termv0.21.0
golang.org/x/textv0.16.0
golang.org/x/timev0.3.0
golang.org/x/toolsv0.21.1-0.20240508182429-e35e4ccd0d2d
google.golang.org/genproto/googleapis/apiv0.0.0-20240528184218-531527333157
google.golang.org/genproto/googleapis/rpcv0.0.0-20240701130421-f6361c86f094
google.golang.org/grpcv1.65.0
google.golang.org/protobufv1.34.2
gopkg.in/evanphx/json-patch.v4v4.12.0
gopkg.in/inf.v0v0.9.1
gopkg.in/natefinch/lumberjack.v2v2.2.1
gopkg.in/square/go-jose.v2v2.6.0
gopkg.in/yaml.v2v2.4.0
gopkg.in/yaml.v3v3.0.1
k8s.io/api
k8s.io/apiextensions-apiserver
k8s.io/apimachinery
k8s.io/apiserver
k8s.io/client-go
k8s.io/cloud-provider
k8s.io/cluster-bootstrap
k8s.io/component-base
k8s.io/component-helpers
k8s.io/controller-manager
k8s.io/cri-api
k8s.io/cri-client
k8s.io/csi-translation-lib
k8s.io/dynamic-resource-allocation
k8s.io/endpointslice
k8s.io/klog/v2v2.130.1
k8s.io/kms
k8s.io/kube-aggregator
k8s.io/kube-controller-manager
k8s.io/kube-openapiv0.0.0-20240228011516-70dd3763d340
k8s.io/kube-scheduler
k8s.io/kubectl
k8s.io/kubelet
k8s.io/metrics
k8s.io/mount-utils
k8s.io/pod-security-admission
k8s.io/utilsv0.0.0-20240711033017-18e509b52bc8
sigs.k8s.io/apiserver-network-proxy/konnectivity-clientv0.30.3
sigs.k8s.io/jsonv0.0.0-20221116044647-bc3834ca7abd
sigs.k8s.io/structured-merge-diff/v4v4.4.1
sigs.k8s.io/yamlv1.4.0
Kubernetes Security Check KSV001Can elevate its own privilegesMEDIUMContainer 'kindnet-cni' of DaemonSet 'kindnet' should set 'securityContext.allowPrivilegeEscalation' to false +
+ https://avd.aquasec.com/misconfig/ksv001 +
+
Kubernetes Security Check KSV003Default capabilities: some containers do not drop allLOWContainer 'kindnet-cni' of DaemonSet 'kindnet' should add 'ALL' to 'securityContext.capabilities.drop' +
+ https://avd.aquasec.com/misconfig/ksv003 +
+
Kubernetes Security Check KSV009Access to host networkHIGHDaemonSet 'kindnet' should not set 'spec.template.spec.hostNetwork' to true +
+ https://avd.aquasec.com/misconfig/ksv009 +
+
Kubernetes Security Check KSV012Runs as root userMEDIUMContainer 'kindnet-cni' of DaemonSet 'kindnet' should set 'securityContext.runAsNonRoot' to true +
+ https://avd.aquasec.com/misconfig/ksv012 +
+
Kubernetes Security Check KSV014Root file system is not read-onlyHIGHContainer 'kindnet-cni' of DaemonSet 'kindnet' should set 'securityContext.readOnlyRootFilesystem' to true +
+ https://avd.aquasec.com/misconfig/ksv014 +
+
Kubernetes Security Check KSV020Runs with UID <= 10000LOWContainer 'kindnet-cni' of DaemonSet 'kindnet' should set 'securityContext.runAsUser' > 10000 +
+ https://avd.aquasec.com/misconfig/ksv020 +
+
Kubernetes Security Check KSV021Runs with GID <= 10000LOWContainer 'kindnet-cni' of DaemonSet 'kindnet' should set 'securityContext.runAsGroup' > 10000 +
+ https://avd.aquasec.com/misconfig/ksv021 +
+
Kubernetes Security Check KSV022Specific capabilities addedMEDIUMContainer 'kindnet-cni' of DaemonSet 'kindnet' should not set 'securityContext.capabilities.add' +
+ https://avd.aquasec.com/misconfig/ksv022 +
+
Kubernetes Security Check KSV023hostPath volumes mountedMEDIUMDaemonSet 'kindnet' should not set 'spec.template.volumes.hostPath' +
+ https://avd.aquasec.com/misconfig/ksv023 +
+
Kubernetes Security Check KSV030Runtime/Default Seccomp profile not setLOWEither Pod or Container should set 'securityContext.seccompProfile.type' to 'RuntimeDefault' +
+ https://avd.aquasec.com/misconfig/ksv030 +
+
Kubernetes Security Check KSV037User Pods should not be placed in kube-system namespaceMEDIUMDaemonSet 'kindnet' should not be set with 'kube-system' namespace +
+ https://avd.aquasec.com/misconfig/ksv037 +
+
Kubernetes Security Check KSV104Seccomp policies disabledMEDIUMcontainer "kindnet-cni" of daemonset "kindnet" in "kube-system" namespace should specify a seccomp profile +
+ https://avd.aquasec.com/misconfig/ksv104 +
+
Kubernetes Security Check KSV106Container capabilities must only include NET_BIND_SERVICELOWcontainer should drop all +
+ https://avd.aquasec.com/misconfig/ksv106 +
+
Kubernetes Security Check KSV119NET_RAW capability addedHIGHcontainer kindnet-cni of daemonset kindnet in kube-system namespace should not include 'NET_RAW' in securityContext.capabilities.add +
+ https://avd.aquasec.com/misconfig/ksv119 +
+
-
-

usr/local/bin/etcd

+ +
+
+ +
+ + +
+
+
+
- + + +
+

DaemonSet/kube-proxy

+
+
+
- - - - - - + + + + + + + + + + + + + + + + + - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - - - - + + + + + + + + + + + - - - + + + + + + + + + + + + + + + + + + + + + - - - + + + + - - - - - - + + + + + + + + + + + - - - - + + + + + + + + + + + + + + +
Package + Type Vulnerability ID - + Misconf ID + Severity + Check Installed Version - - - - Fixed Version - + Severity + Links + + Message
Kubernetes Security Check KSV001Can elevate its own privilegesMEDIUMContainer 'kube-proxy' of DaemonSet 'kube-proxy' should set 'securityContext.allowPrivilegeEscalation' to false +
+ https://avd.aquasec.com/misconfig/ksv001 +
+
Kubernetes Security Check KSV003Default capabilities: some containers do not drop allLOWContainer 'kube-proxy' of DaemonSet 'kube-proxy' should add 'ALL' to 'securityContext.capabilities.drop' +
+ https://avd.aquasec.com/misconfig/ksv003 +
+
github.com/golang-jwt/jwt/v4CVE-2024-51744
Kubernetes Security Check KSV009Access to host networkHIGHDaemonSet 'kube-proxy' should not set 'spec.template.spec.hostNetwork' to true +
+ https://avd.aquasec.com/misconfig/ksv009 +
+
Kubernetes Security Check KSV011CPU not limitedLOWContainer 'kube-proxy' of DaemonSet 'kube-proxy' should set 'resources.limits.cpu' +
+ https://avd.aquasec.com/misconfig/ksv011 +
+
Kubernetes Security Check KSV012Runs as root userMEDIUMContainer 'kube-proxy' of DaemonSet 'kube-proxy' should set 'securityContext.runAsNonRoot' to true +
+ https://avd.aquasec.com/misconfig/ksv012 +
+
Kubernetes Security Check KSV014Root file system is not read-onlyHIGHContainer 'kube-proxy' of DaemonSet 'kube-proxy' should set 'securityContext.readOnlyRootFilesystem' to true +
+ https://avd.aquasec.com/misconfig/ksv014 +
+
Kubernetes Security Check KSV015CPU requests not specified LOWv4.4.24.5.1Container 'kube-proxy' of DaemonSet 'kube-proxy' should set 'resources.requests.cpu' +
+ https://avd.aquasec.com/misconfig/ksv015 +
stdlibCVE-2024-34156
Kubernetes Security Check KSV016Memory requests not specifiedLOWContainer 'kube-proxy' of DaemonSet 'kube-proxy' should set 'resources.requests.memory' +
+ https://avd.aquasec.com/misconfig/ksv016 +
+
Kubernetes Security Check KSV017Privileged HIGHv1.21.121.22.7, 1.23.1Container 'kube-proxy' of DaemonSet 'kube-proxy' should set 'securityContext.privileged' to false +
+ https://avd.aquasec.com/misconfig/ksv017 +
+
Kubernetes Security Check KSV018Memory not limitedLOWContainer 'kube-proxy' of DaemonSet 'kube-proxy' should set 'resources.limits.memory' +
+ https://avd.aquasec.com/misconfig/ksv018 +
+
Kubernetes Security Check KSV020Runs with UID <= 10000LOWContainer 'kube-proxy' of DaemonSet 'kube-proxy' should set 'securityContext.runAsUser' > 10000 +
+ https://avd.aquasec.com/misconfig/ksv020 +
+
Kubernetes Security Check KSV021Runs with GID <= 10000LOWContainer 'kube-proxy' of DaemonSet 'kube-proxy' should set 'securityContext.runAsGroup' > 10000 +
+ https://avd.aquasec.com/misconfig/ksv021 +
stdlibCVE-2024-34155
Kubernetes Security Check KSV023hostPath volumes mounted MEDIUMv1.21.121.22.7, 1.23.1DaemonSet 'kube-proxy' should not set 'spec.template.volumes.hostPath' +
+ https://avd.aquasec.com/misconfig/ksv023 +
stdlibCVE-2024-34158
Kubernetes Security Check KSV030Runtime/Default Seccomp profile not setLOWEither Pod or Container should set 'securityContext.seccompProfile.type' to 'RuntimeDefault' +
+ https://avd.aquasec.com/misconfig/ksv030 +
+
Kubernetes Security Check KSV037User Pods should not be placed in kube-system namespace MEDIUMv1.21.121.22.7, 1.23.1DaemonSet 'kube-proxy' should not be set with 'kube-system' namespace +
+ https://avd.aquasec.com/misconfig/ksv037 +
Kubernetes Security Check KSV104Seccomp policies disabledMEDIUMcontainer "kube-proxy" of daemonset "kube-proxy" in "kube-system" namespace should specify a seccomp profile +
+ https://avd.aquasec.com/misconfig/ksv104 +
+
Kubernetes Security Check KSV106Container capabilities must only include NET_BIND_SERVICELOWcontainer should drop all +
+ https://avd.aquasec.com/misconfig/ksv106 +
+
-
-

Packages

+ +
+
+ +
+ + +
+
+
+
+
- +
+

Deployment/coredns

+
+
+
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ID + Type Name - + Misconf ID + Version + Check SrcName - + Severity + SrcVersion - + + Message +
go.etcd.io/etcd/server/v3
stdlibv1.21.12
../api
../client/pkg
../client/v2
../client/v3
../pkg
../raft
github.com/beorn7/perksv1.0.1
github.com/cenkalti/backoff/v4v4.2.1
github.com/cespare/xxhash/v2v2.2.0
github.com/coreos/go-semverv0.3.0
github.com/coreos/go-systemd/v22v22.3.2
github.com/dustin/go-humanizev1.0.0
github.com/go-logr/logrv1.3.0
github.com/go-logr/stdrv1.2.2
github.com/gogo/protobufv1.3.2
github.com/golang-jwt/jwt/v4v4.4.2
github.com/golang/groupcachev0.0.0-20210331224755-41bb18bfe9da
github.com/golang/protobufv1.5.4
github.com/google/btreev1.0.1
github.com/gorilla/websocketv1.4.2
github.com/grpc-ecosystem/go-grpc-middlewarev1.3.0
github.com/grpc-ecosystem/go-grpc-prometheusv1.2.0
github.com/grpc-ecosystem/grpc-gatewayv1.16.0
github.com/grpc-ecosystem/grpc-gateway/v2v2.16.0
github.com/jonboulle/clockworkv0.2.2
github.com/json-iterator/gov1.1.11
github.com/matttproud/golang_protobuf_extensionsv1.0.1
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.1
github.com/prometheus/client_golangv1.11.1
github.com/prometheus/client_modelv0.2.0
github.com/prometheus/commonv0.26.0
github.com/prometheus/procfsv0.6.0
github.com/sirupsen/logrusv1.9.3
github.com/soheilhy/cmuxv0.1.5
github.com/spf13/cobrav1.1.3
github.com/spf13/pflagv1.0.5
github.com/tmc/grpc-websocket-proxyv0.0.0-20201229170055-e5319fda7802
github.com/xiang90/probingv0.0.0-20190116061207-43a291ad63a2
go.etcd.io/bboltv1.3.10
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpcv0.46.0
go.opentelemetry.io/otelv1.20.0
go.opentelemetry.io/otel/exporters/otlp/otlptracev1.20.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpcv1.20.0
go.opentelemetry.io/otel/metricv1.20.0
go.opentelemetry.io/otel/sdkv1.20.0
go.opentelemetry.io/otel/tracev1.20.0
go.opentelemetry.io/proto/otlpv1.0.0
go.uber.org/atomicv1.7.0
go.uber.org/multierrv1.6.0
go.uber.org/zapv1.17.0
golang.org/x/cryptov0.21.0
golang.org/x/netv0.23.0
golang.org/x/sysv0.18.0
golang.org/x/textv0.14.0
golang.org/x/timev0.0.0-20210220033141-f8bda1e9f3ba
google.golang.org/genprotov0.0.0-20230822172742-b8732ec3820d
google.golang.org/genproto/googleapis/apiv0.0.0-20230822172742-b8732ec3820d
google.golang.org/genproto/googleapis/rpcv0.0.0-20230822172742-b8732ec3820d
google.golang.org/grpcv1.59.0
google.golang.org/protobufv1.33.0
gopkg.in/natefinch/lumberjack.v2v2.0.0
gopkg.in/yaml.v2v2.4.0
sigs.k8s.io/yamlv1.2.0
Kubernetes Security Check KSV011CPU not limitedLOWContainer 'coredns' of Deployment 'coredns' should set 'resources.limits.cpu' +
+ https://avd.aquasec.com/misconfig/ksv011 +
+
Kubernetes Security Check KSV012Runs as root userMEDIUMContainer 'coredns' of Deployment 'coredns' should set 'securityContext.runAsNonRoot' to true +
+ https://avd.aquasec.com/misconfig/ksv012 +
+
Kubernetes Security Check KSV020Runs with UID <= 10000LOWContainer 'coredns' of Deployment 'coredns' should set 'securityContext.runAsUser' > 10000 +
+ https://avd.aquasec.com/misconfig/ksv020 +
+
Kubernetes Security Check KSV021Runs with GID <= 10000LOWContainer 'coredns' of Deployment 'coredns' should set 'securityContext.runAsGroup' > 10000 +
+ https://avd.aquasec.com/misconfig/ksv021 +
+
Kubernetes Security Check KSV022Specific capabilities addedMEDIUMContainer 'coredns' of Deployment 'coredns' should not set 'securityContext.capabilities.add' +
+ https://avd.aquasec.com/misconfig/ksv022 +
+
Kubernetes Security Check KSV030Runtime/Default Seccomp profile not setLOWEither Pod or Container should set 'securityContext.seccompProfile.type' to 'RuntimeDefault' +
+ https://avd.aquasec.com/misconfig/ksv030 +
+
Kubernetes Security Check KSV037User Pods should not be placed in kube-system namespaceMEDIUMDeployment 'coredns' should not be set with 'kube-system' namespace +
+ https://avd.aquasec.com/misconfig/ksv037 +
+
Kubernetes Security Check KSV104Seccomp policies disabledMEDIUMcontainer "coredns" of deployment "coredns" in "kube-system" namespace should specify a seccomp profile +
+ https://avd.aquasec.com/misconfig/ksv104 +
+
Kubernetes Security Check KSV117Prevent binding to privileged portsMEDIUMdeployment coredns in kube-system namespace should not set spec.template.spec.containers.ports.containerPort to less than 1024 +
+ https://avd.aquasec.com/misconfig/ksv117 +
+
-
-

usr/local/bin/etcd-3.5.15

+ +
+
+ +
+ + +
+
+
+
- + + +
+

Pod/etcd-kind-control-plane

+
+
+
- - - - - - + + + + + + + + + + + + + + + + + + + + + + + + - - - - - + + + + - - - - - - + + + + + + + + + + + - - - + + + + + + + + + + + + + + + + + + + + + - - - + + + + - - - - - - + + + + - - - - + + + + + + + +
Package + Type Vulnerability ID - + Misconf ID + Severity + Check Installed Version - - - - Fixed Version - + Severity + Links + + Message
Kubernetes Security Check KSV001Can elevate its own privilegesMEDIUMContainer 'etcd' of Pod 'etcd-kind-control-plane' should set 'securityContext.allowPrivilegeEscalation' to false +
+ https://avd.aquasec.com/misconfig/ksv001 +
+
Kubernetes Security Check KSV003Default capabilities: some containers do not drop allLOWContainer 'etcd' of Pod 'etcd-kind-control-plane' should add 'ALL' to 'securityContext.capabilities.drop' +
+ https://avd.aquasec.com/misconfig/ksv003 +
+
Kubernetes Security Check KSV009Access to host networkHIGHPod 'etcd-kind-control-plane' should not set 'spec.template.spec.hostNetwork' to true +
+ https://avd.aquasec.com/misconfig/ksv009 +
+
github.com/golang-jwt/jwt/v4CVE-2024-51744
Kubernetes Security Check KSV011CPU not limited LOWv4.4.24.5.1Container 'etcd' of Pod 'etcd-kind-control-plane' should set 'resources.limits.cpu' +
+ https://avd.aquasec.com/misconfig/ksv011 +
stdlibCVE-2024-34156
Kubernetes Security Check KSV012Runs as root userMEDIUMContainer 'etcd' of Pod 'etcd-kind-control-plane' should set 'securityContext.runAsNonRoot' to true +
+ https://avd.aquasec.com/misconfig/ksv012 +
+
Kubernetes Security Check KSV014Root file system is not read-only HIGHv1.21.121.22.7, 1.23.1Container 'etcd' of Pod 'etcd-kind-control-plane' should set 'securityContext.readOnlyRootFilesystem' to true +
+ https://avd.aquasec.com/misconfig/ksv014 +
+
Kubernetes Security Check KSV018Memory not limitedLOWContainer 'etcd' of Pod 'etcd-kind-control-plane' should set 'resources.limits.memory' +
+ https://avd.aquasec.com/misconfig/ksv018 +
+
Kubernetes Security Check KSV020Runs with UID <= 10000LOWContainer 'etcd' of Pod 'etcd-kind-control-plane' should set 'securityContext.runAsUser' > 10000 +
+ https://avd.aquasec.com/misconfig/ksv020 +
+
Kubernetes Security Check KSV021Runs with GID <= 10000LOWContainer 'etcd' of Pod 'etcd-kind-control-plane' should set 'securityContext.runAsGroup' > 10000 +
+ https://avd.aquasec.com/misconfig/ksv021 +
stdlibCVE-2024-34155
Kubernetes Security Check KSV023hostPath volumes mounted MEDIUMv1.21.121.22.7, 1.23.1Pod 'etcd-kind-control-plane' should not set 'spec.template.volumes.hostPath' +
+ https://avd.aquasec.com/misconfig/ksv023 +
stdlibCVE-2024-34158
Kubernetes Security Check KSV104Seccomp policies disabled MEDIUMv1.21.121.22.7, 1.23.1container "etcd" of pod "etcd-kind-control-plane" in "kube-system" namespace should specify a seccomp profile +
+ https://avd.aquasec.com/misconfig/ksv104 +
Kubernetes Security Check KSV106Container capabilities must only include NET_BIND_SERVICELOWcontainer should drop all +
+ https://avd.aquasec.com/misconfig/ksv106 +
+
-
-

Packages

+ +
+
+ +
+ + +
+
+
+
+
- +
+

Pod/kube-apiserver-kind-control-plane

+
+
+
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ID + Type Name - + Misconf ID + Version + Check SrcName - + Severity + SrcVersion - + + Message +
go.etcd.io/etcd/server/v3
stdlibv1.21.12
../api
../client/pkg
../client/v2
../client/v3
../pkg
../raft
github.com/beorn7/perksv1.0.1
github.com/cenkalti/backoff/v4v4.2.1
github.com/cespare/xxhash/v2v2.2.0
github.com/coreos/go-semverv0.3.0
github.com/coreos/go-systemd/v22v22.3.2
github.com/dustin/go-humanizev1.0.0
github.com/go-logr/logrv1.3.0
github.com/go-logr/stdrv1.2.2
github.com/gogo/protobufv1.3.2
github.com/golang-jwt/jwt/v4v4.4.2
github.com/golang/groupcachev0.0.0-20210331224755-41bb18bfe9da
github.com/golang/protobufv1.5.4
github.com/google/btreev1.0.1
github.com/gorilla/websocketv1.4.2
github.com/grpc-ecosystem/go-grpc-middlewarev1.3.0
github.com/grpc-ecosystem/go-grpc-prometheusv1.2.0
github.com/grpc-ecosystem/grpc-gatewayv1.16.0
github.com/grpc-ecosystem/grpc-gateway/v2v2.16.0
github.com/jonboulle/clockworkv0.2.2
github.com/json-iterator/gov1.1.11
github.com/matttproud/golang_protobuf_extensionsv1.0.1
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.1
github.com/prometheus/client_golangv1.11.1
github.com/prometheus/client_modelv0.2.0
github.com/prometheus/commonv0.26.0
github.com/prometheus/procfsv0.6.0
github.com/sirupsen/logrusv1.9.3
github.com/soheilhy/cmuxv0.1.5
github.com/spf13/cobrav1.1.3
github.com/spf13/pflagv1.0.5
github.com/tmc/grpc-websocket-proxyv0.0.0-20201229170055-e5319fda7802
github.com/xiang90/probingv0.0.0-20190116061207-43a291ad63a2
go.etcd.io/bboltv1.3.10
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpcv0.46.0
go.opentelemetry.io/otelv1.20.0
go.opentelemetry.io/otel/exporters/otlp/otlptracev1.20.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpcv1.20.0
go.opentelemetry.io/otel/metricv1.20.0
go.opentelemetry.io/otel/sdkv1.20.0
go.opentelemetry.io/otel/tracev1.20.0
go.opentelemetry.io/proto/otlpv1.0.0
go.uber.org/atomicv1.7.0
go.uber.org/multierrv1.6.0
go.uber.org/zapv1.17.0
golang.org/x/cryptov0.21.0
golang.org/x/netv0.23.0
golang.org/x/sysv0.18.0
golang.org/x/textv0.14.0
golang.org/x/timev0.0.0-20210220033141-f8bda1e9f3ba
google.golang.org/genprotov0.0.0-20230822172742-b8732ec3820d
google.golang.org/genproto/googleapis/apiv0.0.0-20230822172742-b8732ec3820d
google.golang.org/genproto/googleapis/rpcv0.0.0-20230822172742-b8732ec3820d
google.golang.org/grpcv1.59.0
google.golang.org/protobufv1.33.0
gopkg.in/natefinch/lumberjack.v2v2.0.0
gopkg.in/yaml.v2v2.4.0
sigs.k8s.io/yamlv1.2.0
Kubernetes Security Check KCV0001Ensure that the --anonymous-auth argument is set to falseMEDIUMEnsure that the --anonymous-auth argument is set to false +
+ https://avd.aquasec.com/misconfig/kcv0001 +
+
Kubernetes Security Check KCV0006Ensure that the --kubelet-certificate-authority argument is set as appropriateLOWEnsure that the --kubelet-certificate-authority argument is set as appropriate +
+ https://avd.aquasec.com/misconfig/kcv0006 +
+
Kubernetes Security Check KCV0010Ensure that the admission control plugin EventRateLimit is setLOWEnsure that the admission control plugin EventRateLimit is set +
+ https://avd.aquasec.com/misconfig/kcv0010 +
+
Kubernetes Security Check KSV0012Ensure that the admission control plugin AlwaysPullImages is setLOWEnsure that the admission control plugin AlwaysPullImages is set +
+ https://avd.aquasec.com/misconfig/ksv0012 +
+
Kubernetes Security Check KCV0018Ensure that the --profiling argument is set to falseLOWEnsure that the --profiling argument is set to false +
+ https://avd.aquasec.com/misconfig/kcv0018 +
+
Kubernetes Security Check KCV0019Ensure that the --audit-log-path argument is setLOWEnsure that the --audit-log-path argument is set +
+ https://avd.aquasec.com/misconfig/kcv0019 +
+
Kubernetes Security Check KCV0020Ensure that the --audit-log-maxage argument is set to 30 or as appropriateLOWEnsure that the --audit-log-maxage argument is set to 30 or as appropriate +
+ https://avd.aquasec.com/misconfig/kcv0020 +
+
Kubernetes Security Check KCV0021Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriateLOWEnsure that the --audit-log-maxbackup argument is set to 10 or as appropriate +
+ https://avd.aquasec.com/misconfig/kcv0021 +
+
Kubernetes Security Check KCV0022Ensure that the --audit-log-maxsize argument is set to 100 or as appropriateLOWEnsure that the --audit-log-maxsize argument is set to 100 or as appropriate +
+ https://avd.aquasec.com/misconfig/kcv0022 +
+
Kubernetes Security Check KCV0030Ensure that the --encryption-provider-config argument is set as appropriateLOWEnsure that the --encryption-provider-config argument is set as appropriate +
+ https://avd.aquasec.com/misconfig/kcv0030 +
+
Kubernetes Security Check KSV001Can elevate its own privilegesMEDIUMContainer 'kube-apiserver' of Pod 'kube-apiserver-kind-control-plane' should set 'securityContext.allowPrivilegeEscalation' to false +
+ https://avd.aquasec.com/misconfig/ksv001 +
+
Kubernetes Security Check KSV003Default capabilities: some containers do not drop allLOWContainer 'kube-apiserver' of Pod 'kube-apiserver-kind-control-plane' should add 'ALL' to 'securityContext.capabilities.drop' +
+ https://avd.aquasec.com/misconfig/ksv003 +
+
Kubernetes Security Check KSV009Access to host networkHIGHPod 'kube-apiserver-kind-control-plane' should not set 'spec.template.spec.hostNetwork' to true +
+ https://avd.aquasec.com/misconfig/ksv009 +
+
Kubernetes Security Check KSV011CPU not limitedLOWContainer 'kube-apiserver' of Pod 'kube-apiserver-kind-control-plane' should set 'resources.limits.cpu' +
+ https://avd.aquasec.com/misconfig/ksv011 +
+
Kubernetes Security Check KSV012Runs as root userMEDIUMContainer 'kube-apiserver' of Pod 'kube-apiserver-kind-control-plane' should set 'securityContext.runAsNonRoot' to true +
+ https://avd.aquasec.com/misconfig/ksv012 +
+
Kubernetes Security Check KSV014Root file system is not read-onlyHIGHContainer 'kube-apiserver' of Pod 'kube-apiserver-kind-control-plane' should set 'securityContext.readOnlyRootFilesystem' to true +
+ https://avd.aquasec.com/misconfig/ksv014 +
+
Kubernetes Security Check KSV016Memory requests not specifiedLOWContainer 'kube-apiserver' of Pod 'kube-apiserver-kind-control-plane' should set 'resources.requests.memory' +
+ https://avd.aquasec.com/misconfig/ksv016 +
+
Kubernetes Security Check KSV018Memory not limitedLOWContainer 'kube-apiserver' of Pod 'kube-apiserver-kind-control-plane' should set 'resources.limits.memory' +
+ https://avd.aquasec.com/misconfig/ksv018 +
+
Kubernetes Security Check KSV020Runs with UID <= 10000LOWContainer 'kube-apiserver' of Pod 'kube-apiserver-kind-control-plane' should set 'securityContext.runAsUser' > 10000 +
+ https://avd.aquasec.com/misconfig/ksv020 +
+
Kubernetes Security Check KSV021Runs with GID <= 10000LOWContainer 'kube-apiserver' of Pod 'kube-apiserver-kind-control-plane' should set 'securityContext.runAsGroup' > 10000 +
+ https://avd.aquasec.com/misconfig/ksv021 +
+
Kubernetes Security Check KSV023hostPath volumes mountedMEDIUMPod 'kube-apiserver-kind-control-plane' should not set 'spec.template.volumes.hostPath' +
+ https://avd.aquasec.com/misconfig/ksv023 +
+
Kubernetes Security Check KSV104Seccomp policies disabledMEDIUMcontainer "kube-apiserver" of pod "kube-apiserver-kind-control-plane" in "kube-system" namespace should specify a seccomp profile +
+ https://avd.aquasec.com/misconfig/ksv104 +
+
Kubernetes Security Check KSV106Container capabilities must only include NET_BIND_SERVICELOWcontainer should drop all +
+ https://avd.aquasec.com/misconfig/ksv106 +
+
-
-

usr/local/bin/etcdctl

+ +
+
+ +
+ + +
+
+
+
- + + +
+

Pod/kube-controller-manager-kind-control-plane

+
+
+
- - - - - - + + + + + + + + + + + + + + + + + + + + + + + + - - - - - + + + + + + + + + + + + + + + + + + + + + + + + + - - - + + + + + + + - - - + + + + - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + - - - + + + + - - - - - - + + + + - - - - + + + + + + + +
Package + Type Vulnerability ID - + Misconf ID + Severity + Check Installed Version - - - - Fixed Version - + Severity + Links + + Message
Kubernetes Security Check KCV0033Ensure that the --terminated-pod-gc-threshold argument is set as appropriateLOWEnsure that the --terminated-pod-gc-threshold argument is set as appropriate +
+ https://avd.aquasec.com/misconfig/kcv0033 +
+
Kubernetes Security Check KCV0034Ensure that the --profiling argument is set to falseLOWEnsure that the --profiling argument is set to false +
+ https://avd.aquasec.com/misconfig/kcv0034 +
+
Kubernetes Security Check KCV0038Ensure that the RotateKubeletServerCertificate argument is set to trueLOWEnsure that the RotateKubeletServerCertificate argument is set to true +
+ https://avd.aquasec.com/misconfig/kcv0038 +
+
github.com/golang-jwt/jwt/v4CVE-2024-51744
Kubernetes Security Check KSV001Can elevate its own privilegesMEDIUMContainer 'kube-controller-manager' of Pod 'kube-controller-manager-kind-control-plane' should set 'securityContext.allowPrivilegeEscalation' to false +
+ https://avd.aquasec.com/misconfig/ksv001 +
+
Kubernetes Security Check KSV003Default capabilities: some containers do not drop allLOWContainer 'kube-controller-manager' of Pod 'kube-controller-manager-kind-control-plane' should add 'ALL' to 'securityContext.capabilities.drop' +
+ https://avd.aquasec.com/misconfig/ksv003 +
+
Kubernetes Security Check KSV009Access to host networkHIGHPod 'kube-controller-manager-kind-control-plane' should not set 'spec.template.spec.hostNetwork' to true +
+ https://avd.aquasec.com/misconfig/ksv009 +
+
Kubernetes Security Check KSV011CPU not limited LOWv4.4.24.5.1Container 'kube-controller-manager' of Pod 'kube-controller-manager-kind-control-plane' should set 'resources.limits.cpu' +
+ https://avd.aquasec.com/misconfig/ksv011 +
+
Kubernetes Security Check KSV012Runs as root userMEDIUMContainer 'kube-controller-manager' of Pod 'kube-controller-manager-kind-control-plane' should set 'securityContext.runAsNonRoot' to true +
+ https://avd.aquasec.com/misconfig/ksv012 +
stdlibCVE-2024-34156
Kubernetes Security Check KSV014Root file system is not read-only HIGHv1.21.121.22.7, 1.23.1Container 'kube-controller-manager' of Pod 'kube-controller-manager-kind-control-plane' should set 'securityContext.readOnlyRootFilesystem' to true +
+ https://avd.aquasec.com/misconfig/ksv014 +
+
Kubernetes Security Check KSV016Memory requests not specifiedLOWContainer 'kube-controller-manager' of Pod 'kube-controller-manager-kind-control-plane' should set 'resources.requests.memory' +
+ https://avd.aquasec.com/misconfig/ksv016 +
+
Kubernetes Security Check KSV018Memory not limitedLOWContainer 'kube-controller-manager' of Pod 'kube-controller-manager-kind-control-plane' should set 'resources.limits.memory' +
+ https://avd.aquasec.com/misconfig/ksv018 +
+
Kubernetes Security Check KSV020Runs with UID <= 10000LOWContainer 'kube-controller-manager' of Pod 'kube-controller-manager-kind-control-plane' should set 'securityContext.runAsUser' > 10000 +
+ https://avd.aquasec.com/misconfig/ksv020 +
+
Kubernetes Security Check KSV021Runs with GID <= 10000LOWContainer 'kube-controller-manager' of Pod 'kube-controller-manager-kind-control-plane' should set 'securityContext.runAsGroup' > 10000 +
+ https://avd.aquasec.com/misconfig/ksv021 +
stdlibCVE-2024-34155
Kubernetes Security Check KSV023hostPath volumes mounted MEDIUMv1.21.121.22.7, 1.23.1Pod 'kube-controller-manager-kind-control-plane' should not set 'spec.template.volumes.hostPath' +
+ https://avd.aquasec.com/misconfig/ksv023 +
stdlibCVE-2024-34158
Kubernetes Security Check KSV104Seccomp policies disabled MEDIUMv1.21.121.22.7, 1.23.1container "kube-controller-manager" of pod "kube-controller-manager-kind-control-plane" in "kube-system" namespace should specify a seccomp profile +
+ https://avd.aquasec.com/misconfig/ksv104 +
Kubernetes Security Check KSV106Container capabilities must only include NET_BIND_SERVICELOWcontainer should drop all +
+ https://avd.aquasec.com/misconfig/ksv106 +
+
-
-

Packages

+ +
+
+ +
+ + +
+
+
+
+
- +
+

Pod/kube-scheduler-kind-control-plane

+
+
+
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ID + Type Name - + Misconf ID + Version + Check SrcName - + Severity + SrcVersion - + + Message +
go.etcd.io/etcd/etcdctl/v3
stdlibv1.21.12
../api
../client/pkg
../client/v2
../client/v3
../etcdutl
../pkg
../raft
../server
github.com/beorn7/perksv1.0.1
github.com/bgentry/speakeasyv0.1.0
github.com/cespare/xxhash/v2v2.2.0
github.com/coreos/go-semverv0.3.0
github.com/coreos/go-systemd/v22v22.3.2
github.com/cpuguy83/go-md2man/v2v2.0.0
github.com/dustin/go-humanizev1.0.0
github.com/go-logr/logrv1.3.0
github.com/go-logr/stdrv1.2.2
github.com/gogo/protobufv1.3.2
github.com/golang-jwt/jwt/v4v4.4.2
github.com/golang/protobufv1.5.4
github.com/google/btreev1.0.1
github.com/jonboulle/clockworkv0.2.2
github.com/json-iterator/gov1.1.11
github.com/mattn/go-runewidthv0.0.9
github.com/matttproud/golang_protobuf_extensionsv1.0.1
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.1
github.com/olekukonko/tablewriterv0.0.5
github.com/prometheus/client_golangv1.11.1
github.com/prometheus/client_modelv0.2.0
github.com/prometheus/commonv0.26.0
github.com/prometheus/procfsv0.6.0
github.com/russross/blackfriday/v2v2.0.1
github.com/shurcooL/sanitized_anchor_namev1.0.0
github.com/spf13/cobrav1.1.3
github.com/spf13/pflagv1.0.5
github.com/urfave/cliv1.22.4
github.com/xiang90/probingv0.0.0-20190116061207-43a291ad63a2
go.etcd.io/bboltv1.3.10
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpcv0.46.0
go.opentelemetry.io/otelv1.20.0
go.opentelemetry.io/otel/metricv1.20.0
go.opentelemetry.io/otel/tracev1.20.0
go.uber.org/atomicv1.7.0
go.uber.org/multierrv1.6.0
go.uber.org/zapv1.17.0
golang.org/x/cryptov0.21.0
golang.org/x/netv0.23.0
golang.org/x/sysv0.18.0
golang.org/x/textv0.14.0
golang.org/x/timev0.0.0-20210220033141-f8bda1e9f3ba
google.golang.org/genproto/googleapis/apiv0.0.0-20230822172742-b8732ec3820d
google.golang.org/genproto/googleapis/rpcv0.0.0-20230822172742-b8732ec3820d
google.golang.org/grpcv1.59.0
google.golang.org/protobufv1.33.0
gopkg.in/cheggaaa/pb.v1v1.0.28
Kubernetes Security Check KCV0040Ensure that the --profiling argument is set to falseLOWEnsure that the --profiling argument is set to false +
+ https://avd.aquasec.com/misconfig/kcv0040 +
+
Kubernetes Security Check KSV001Can elevate its own privilegesMEDIUMContainer 'kube-scheduler' of Pod 'kube-scheduler-kind-control-plane' should set 'securityContext.allowPrivilegeEscalation' to false +
+ https://avd.aquasec.com/misconfig/ksv001 +
+
Kubernetes Security Check KSV003Default capabilities: some containers do not drop allLOWContainer 'kube-scheduler' of Pod 'kube-scheduler-kind-control-plane' should add 'ALL' to 'securityContext.capabilities.drop' +
+ https://avd.aquasec.com/misconfig/ksv003 +
+
Kubernetes Security Check KSV009Access to host networkHIGHPod 'kube-scheduler-kind-control-plane' should not set 'spec.template.spec.hostNetwork' to true +
+ https://avd.aquasec.com/misconfig/ksv009 +
+
Kubernetes Security Check KSV011CPU not limitedLOWContainer 'kube-scheduler' of Pod 'kube-scheduler-kind-control-plane' should set 'resources.limits.cpu' +
+ https://avd.aquasec.com/misconfig/ksv011 +
+
Kubernetes Security Check KSV012Runs as root userMEDIUMContainer 'kube-scheduler' of Pod 'kube-scheduler-kind-control-plane' should set 'securityContext.runAsNonRoot' to true +
+ https://avd.aquasec.com/misconfig/ksv012 +
+
Kubernetes Security Check KSV014Root file system is not read-onlyHIGHContainer 'kube-scheduler' of Pod 'kube-scheduler-kind-control-plane' should set 'securityContext.readOnlyRootFilesystem' to true +
+ https://avd.aquasec.com/misconfig/ksv014 +
+
Kubernetes Security Check KSV016Memory requests not specifiedLOWContainer 'kube-scheduler' of Pod 'kube-scheduler-kind-control-plane' should set 'resources.requests.memory' +
+ https://avd.aquasec.com/misconfig/ksv016 +
+
Kubernetes Security Check KSV018Memory not limitedLOWContainer 'kube-scheduler' of Pod 'kube-scheduler-kind-control-plane' should set 'resources.limits.memory' +
+ https://avd.aquasec.com/misconfig/ksv018 +
+
Kubernetes Security Check KSV020Runs with UID <= 10000LOWContainer 'kube-scheduler' of Pod 'kube-scheduler-kind-control-plane' should set 'securityContext.runAsUser' > 10000 +
+ https://avd.aquasec.com/misconfig/ksv020 +
+
Kubernetes Security Check KSV021Runs with GID <= 10000LOWContainer 'kube-scheduler' of Pod 'kube-scheduler-kind-control-plane' should set 'securityContext.runAsGroup' > 10000 +
+ https://avd.aquasec.com/misconfig/ksv021 +
+
Kubernetes Security Check KSV023hostPath volumes mountedMEDIUMPod 'kube-scheduler-kind-control-plane' should not set 'spec.template.volumes.hostPath' +
+ https://avd.aquasec.com/misconfig/ksv023 +
+
Kubernetes Security Check KSV104Seccomp policies disabledMEDIUMcontainer "kube-scheduler" of pod "kube-scheduler-kind-control-plane" in "kube-system" namespace should specify a seccomp profile +
+ https://avd.aquasec.com/misconfig/ksv104 +
+
Kubernetes Security Check KSV106Container capabilities must only include NET_BIND_SERVICELOWcontainer should drop all +
+ https://avd.aquasec.com/misconfig/ksv106 +
+
-
-

usr/local/bin/etcdctl-3.5.15

+ +
+
+ +
+ + +
+
+
+
- + + +
+

Role/system::leader-locking-kube-controller-manager

+
+
+
- - - - - - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + - - - - +
Package + Type Vulnerability ID - + Misconf ID + Severity + Check Installed Version - - - - Fixed Version - + Severity + Links + + Message
github.com/golang-jwt/jwt/v4CVE-2024-51744LOWv4.4.24.5.1
stdlibCVE-2024-34156HIGHv1.21.121.22.7, 1.23.1
stdlibCVE-2024-34155MEDIUMv1.21.121.22.7, 1.23.1
stdlibCVE-2024-34158
Kubernetes Security Check KSV049Manage configmaps MEDIUMv1.21.121.22.7, 1.23.1Role 'system::leader-locking-kube-controller-manager' should not have access to resource 'configmaps' for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv049 +
-
-

Packages

+ +
+
+ +
+ + +
+
+
+
+
- +
+

Role/system::leader-locking-kube-scheduler

+
+
+
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + - +
ID + Type Name - + Misconf ID + Version + Check SrcName - + Severity + SrcVersion - + + Message +
go.etcd.io/etcd/etcdctl/v3
stdlibv1.21.12
../api
../client/pkg
../client/v2
../client/v3
../etcdutl
../pkg
../raft
../server
github.com/beorn7/perksv1.0.1
github.com/bgentry/speakeasyv0.1.0
github.com/cespare/xxhash/v2v2.2.0
github.com/coreos/go-semverv0.3.0
github.com/coreos/go-systemd/v22v22.3.2
github.com/cpuguy83/go-md2man/v2v2.0.0
github.com/dustin/go-humanizev1.0.0
github.com/go-logr/logrv1.3.0
github.com/go-logr/stdrv1.2.2
github.com/gogo/protobufv1.3.2
github.com/golang-jwt/jwt/v4v4.4.2
github.com/golang/protobufv1.5.4
github.com/google/btreev1.0.1
github.com/jonboulle/clockworkv0.2.2
github.com/json-iterator/gov1.1.11
github.com/mattn/go-runewidthv0.0.9
github.com/matttproud/golang_protobuf_extensionsv1.0.1
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.1
github.com/olekukonko/tablewriterv0.0.5
github.com/prometheus/client_golangv1.11.1
github.com/prometheus/client_modelv0.2.0
github.com/prometheus/commonv0.26.0
github.com/prometheus/procfsv0.6.0
github.com/russross/blackfriday/v2v2.0.1
github.com/shurcooL/sanitized_anchor_namev1.0.0
github.com/spf13/cobrav1.1.3
github.com/spf13/pflagv1.0.5
github.com/urfave/cliv1.22.4
github.com/xiang90/probingv0.0.0-20190116061207-43a291ad63a2
go.etcd.io/bboltv1.3.10
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpcv0.46.0
go.opentelemetry.io/otelv1.20.0
go.opentelemetry.io/otel/metricv1.20.0
go.opentelemetry.io/otel/tracev1.20.0
go.uber.org/atomicv1.7.0
go.uber.org/multierrv1.6.0
go.uber.org/zapv1.17.0
golang.org/x/cryptov0.21.0
golang.org/x/netv0.23.0
golang.org/x/sysv0.18.0
golang.org/x/textv0.14.0
golang.org/x/timev0.0.0-20210220033141-f8bda1e9f3ba
google.golang.org/genproto/googleapis/apiv0.0.0-20230822172742-b8732ec3820d
google.golang.org/genproto/googleapis/rpcv0.0.0-20230822172742-b8732ec3820d
google.golang.org/grpcv1.59.0
google.golang.org/protobufv1.33.0
gopkg.in/cheggaaa/pb.v1v1.0.28
Kubernetes Security Check KSV049Manage configmapsMEDIUMRole 'system::leader-locking-kube-scheduler' should not have access to resource 'configmaps' for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv049 +
+
-
-

usr/local/bin/migrate

+ +
+
+ +
+ + +
+
+
+
- + + +
+

Role/system:controller:bootstrap-signer

+
+
+
- - - - - - + - - - - - - - - - - - - - - - - - - - - - + + + + + + - - - - +
Package + Type Vulnerability ID - + Misconf ID + Severity + Check Installed Version - - - - Fixed Version - + Severity + Links + + Message
stdlibCVE-2024-34156HIGHv1.21.121.22.7, 1.23.1
stdlibCVE-2024-34155MEDIUMv1.21.121.22.7, 1.23.1
stdlibCVE-2024-34158
Kubernetes Security Check KSV113Manage namespace secrets MEDIUMv1.21.121.22.7, 1.23.1Role 'system:controller:bootstrap-signer' shouldn't have access to manage secrets in namespace 'kube-system' +
+ https://avd.aquasec.com/misconfig/ksv113 +
-
-

Packages

+ +
+
+ +
+ + +
+
+
+
+
- +
+

Role/system:controller:cloud-provider

+
+
+
- - - - - - - - - - - - - + + + + + + + + - +
ID + Type Name - + Misconf ID + Version + Check SrcName - + Severity + SrcVersion - + + Message +
stdlibv1.21.12
Kubernetes Security Check KSV049Manage configmapsMEDIUMRole 'system:controller:cloud-provider' should not have access to resource 'configmaps' for verbs ["create", "update", "patch", "delete", "deletecollection", "impersonate", "*"] +
+ https://avd.aquasec.com/misconfig/ksv049 +
+
-
-

docker.io/kindest/local-path-provisioner:v20240813-c6f155d6 (debian 11.10)

+ +
+
+ +
+ + +
+
+
+
- + + +
+

Role/system:controller:token-cleaner

+
+
+
- - - - - - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + - - - - - - - - - - - - - - - - - - - - - - - - - - - - +
Package + Type Vulnerability ID - + Misconf ID + Severity + Check Installed Version - - - - Fixed Version - + Severity + Links + + Message
libc6CVE-2023-4806MEDIUM2.31-13+deb11u10
libc6CVE-2023-4813MEDIUM2.31-13+deb11u10
libc6CVE-2010-4756LOW2.31-13+deb11u10
libc6CVE-2018-20796LOW2.31-13+deb11u10
libc6CVE-2019-1010022LOW2.31-13+deb11u10
libc6CVE-2019-1010023LOW2.31-13+deb11u10
libc6CVE-2019-1010024LOW2.31-13+deb11u10
libc6CVE-2019-1010025LOW2.31-13+deb11u10
libc6CVE-2019-9192LOW2.31-13+deb11u10
libssl1.1CVE-2023-5678MEDIUM1.1.1w-0+deb11u11.1.1w-0+deb11u2
libssl1.1CVE-2024-0727MEDIUM1.1.1w-0+deb11u11.1.1w-0+deb11u2
libssl1.1CVE-2024-4741MEDIUM1.1.1w-0+deb11u11.1.1w-0+deb11u2
libssl1.1CVE-2024-5535MEDIUM1.1.1w-0+deb11u11.1.1w-0+deb11u2
libssl1.1CVE-2024-2511LOW1.1.1w-0+deb11u11.1.1w-0+deb11u2
libssl1.1CVE-2024-9143LOW1.1.1w-0+deb11u11.1.1w-0+deb11u2
opensslCVE-2023-5678MEDIUM1.1.1w-0+deb11u11.1.1w-0+deb11u2
opensslCVE-2024-0727MEDIUM1.1.1w-0+deb11u11.1.1w-0+deb11u2
opensslCVE-2024-4741MEDIUM1.1.1w-0+deb11u11.1.1w-0+deb11u2
opensslCVE-2024-5535
Kubernetes Security Check KSV113Manage namespace secrets MEDIUM1.1.1w-0+deb11u11.1.1w-0+deb11u2
opensslCVE-2024-2511LOW1.1.1w-0+deb11u11.1.1w-0+deb11u2Role 'system:controller:token-cleaner' shouldn't have access to manage secrets in namespace 'kube-system' +
+ https://avd.aquasec.com/misconfig/ksv113 +
opensslCVE-2024-9143LOW1.1.1w-0+deb11u11.1.1w-0+deb11u2
tzdataDLA-3972-1UNKNOWN2024a-0+deb11u12024b-0+deb11u1
-
-

Packages

+ +
+
+ +
+ + +
+
+
+
+
- +
+

Service/kube-dns

+
+
+
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + + + + + + - +
ID + Type Name - + Misconf ID + Version + Check SrcName - + Severity + SrcVersion - + + Message +
base-files@11.1+deb11u10base-files11.1+deb11u10base-files11.1+deb11u10
libc6@2.31-13+deb11u10libc62.31glibc2.31
libssl1.1@1.1.1w-0+deb11u1libssl1.11.1.1wopenssl1.1.1w
netbase@6.3netbase6.3netbase6.3
openssl@1.1.1w-0+deb11u1openssl1.1.1wopenssl1.1.1w
tzdata@2024a-0+deb11u1tzdata2024atzdata2024a
Kubernetes Security Check KSV037User Pods should not be placed in kube-system namespaceMEDIUMService 'kube-dns' should not be set with 'kube-system' namespace +
+ https://avd.aquasec.com/misconfig/ksv037 +
+
-
-

usr/local/bin/local-path-provisioner

+ +
+
+ +
+ + +
+
+
+
- + + +
+

Deployment/local-path-provisioner

+
+
+
- - - - - - + - - - - - - - - - + + + + + + + + + + + + + - - - + + + + + + + + + + + - - - - - - + + + + - - - - - - - - - - + + + + + - - - - - - - + + + + + - - - - - - - + + + + + - - - - - - - + + + + + - - - - - - - + + + + + - - - - - - - + + + + + - - - + + + + - - - - - - - - - - + + + + + - +
Package + Type Vulnerability ID - + Misconf ID + Severity + Check Installed Version - - - - Fixed Version - + Severity + Links + + Message
github.com/gogo/protobufCVE-2021-3121HIGHv1.3.11.3.2
Kubernetes Security Check KSV001Can elevate its own privilegesMEDIUMContainer 'local-path-provisioner' of Deployment 'local-path-provisioner' should set 'securityContext.allowPrivilegeEscalation' to false +
+ https://avd.aquasec.com/misconfig/ksv001 +
+
Kubernetes Security Check KSV003Default capabilities: some containers do not drop allLOWContainer 'local-path-provisioner' of Deployment 'local-path-provisioner' should add 'ALL' to 'securityContext.capabilities.drop' +
+ https://avd.aquasec.com/misconfig/ksv003 +
golang.org/x/cryptoCVE-2023-48795
Kubernetes Security Check KSV011CPU not limitedLOWContainer 'local-path-provisioner' of Deployment 'local-path-provisioner' should set 'resources.limits.cpu' +
+ https://avd.aquasec.com/misconfig/ksv011 +
+
Kubernetes Security Check KSV012Runs as root user MEDIUMv0.7.00.17.0Container 'local-path-provisioner' of Deployment 'local-path-provisioner' should set 'securityContext.runAsNonRoot' to true +
+ https://avd.aquasec.com/misconfig/ksv012 +
golang.org/x/netCVE-2023-39325
Kubernetes Security Check KSV014Root file system is not read-only HIGHv0.8.00.17.0Container 'local-path-provisioner' of Deployment 'local-path-provisioner' should set 'securityContext.readOnlyRootFilesystem' to true +
+ https://avd.aquasec.com/misconfig/ksv014 +
golang.org/x/netCVE-2023-3978MEDIUMv0.8.00.13.0
Kubernetes Security Check KSV015CPU requests not specifiedLOWContainer 'local-path-provisioner' of Deployment 'local-path-provisioner' should set 'resources.requests.cpu' +
+ https://avd.aquasec.com/misconfig/ksv015 +
golang.org/x/netCVE-2023-44487MEDIUMv0.8.00.17.0
Kubernetes Security Check KSV016Memory requests not specifiedLOWContainer 'local-path-provisioner' of Deployment 'local-path-provisioner' should set 'resources.requests.memory' +
+ https://avd.aquasec.com/misconfig/ksv016 +
golang.org/x/netCVE-2023-45288MEDIUMv0.8.00.23.0
Kubernetes Security Check KSV018Memory not limitedLOWContainer 'local-path-provisioner' of Deployment 'local-path-provisioner' should set 'resources.limits.memory' +
+ https://avd.aquasec.com/misconfig/ksv018 +
google.golang.org/protobufCVE-2024-24786MEDIUMv1.30.01.33.0
Kubernetes Security Check KSV020Runs with UID <= 10000LOWContainer 'local-path-provisioner' of Deployment 'local-path-provisioner' should set 'securityContext.runAsUser' > 10000 +
+ https://avd.aquasec.com/misconfig/ksv020 +
k8s.io/client-goCVE-2020-8565MEDIUMv0.19.10.19.6, 0.20.0-alpha.2, 0.18.14, 0.17.16
Kubernetes Security Check KSV021Runs with GID <= 10000LOWContainer 'local-path-provisioner' of Deployment 'local-path-provisioner' should set 'securityContext.runAsGroup' > 10000 +
+ https://avd.aquasec.com/misconfig/ksv021 +
stdlibCVE-2024-34156HIGHv1.22.61.22.7, 1.23.1
Kubernetes Security Check KSV030Runtime/Default Seccomp profile not setLOWEither Pod or Container should set 'securityContext.seccompProfile.type' to 'RuntimeDefault' +
+ https://avd.aquasec.com/misconfig/ksv030 +
stdlibCVE-2024-34155
Kubernetes Security Check KSV104Seccomp policies disabled MEDIUMv1.22.61.22.7, 1.23.1container "local-path-provisioner" of deployment "local-path-provisioner" in "local-path-storage" namespace should specify a seccomp profile +
+ https://avd.aquasec.com/misconfig/ksv104 +
stdlibCVE-2024-34158MEDIUMv1.22.61.22.7, 1.23.1
Kubernetes Security Check KSV106Container capabilities must only include NET_BIND_SERVICELOWcontainer should drop all +
+ https://avd.aquasec.com/misconfig/ksv106 +
-
-

Packages

+ +
+
+ +
+ + +
+
+
+
+
- - - - - - - - +
+

registry.k8s.io/coredns/coredns:v1.11.3 (debian 11.10)

+
+
ID - - - - Name - - - - Version - - - - SrcName - - - - SrcVersion - - - -
+ + + + + + + + + + + + + + + + + + + + +
Package + + + + Vulnerability ID + + + + Severity + + + + Installed Version + + + + Fixed Version + + + + Links + + + +
tzdataDLA-3972-1UNKNOWN2024a-0+deb11u12024b-0+deb11u1
+
+

Packages

+
- - - - - - github.com/rancher/local-path-provisioner - v0.0.24 - - - - - - stdlib - v1.22.6 - - - - - - github.com/Sirupsen/logrus - v0.11.0 - - - - - - github.com/beorn7/perks - v1.0.1 - - - - - - github.com/cespare/xxhash/v2 - v2.1.2 - - - - - - github.com/davecgh/go-spew - v1.1.1 - - - - - - github.com/go-logr/logr - v0.2.0 - - - - - - github.com/gogo/protobuf - v1.3.1 - - - - - - github.com/golang/groupcache - v0.0.0-20200121045136-8c9f03a8e57e - - - - - - github.com/golang/protobuf - v1.5.3 - - - - - - github.com/google/go-cmp - v0.5.8 - - - - - - github.com/google/gofuzz - v1.1.0 - - - - - - github.com/google/uuid - v1.1.1 - - - - - - github.com/googleapis/gnostic - v0.4.1 - - - - - - github.com/hashicorp/golang-lru - v0.5.1 - - - - - - github.com/imdario/mergo - v0.3.5 - - - - - - github.com/json-iterator/go - v1.1.12 - - - - - - github.com/matttproud/golang_protobuf_extensions - v1.0.1 - - - - - - github.com/miekg/dns - v1.1.29 - - - - - - github.com/modern-go/concurrent - v0.0.0-20180306012644-bacd9c7ef1dd - - - - - - github.com/modern-go/reflect2 - v1.0.2 - - - - - - github.com/pkg/errors - v0.9.1 - - - - - - github.com/prometheus/client_golang - v1.11.1 - - - - - - github.com/prometheus/client_model - v0.3.0 - - - - - - github.com/prometheus/common - v0.32.1 - - - - - - github.com/prometheus/procfs - v0.8.0 - - - - - - github.com/spf13/pflag - v1.0.5 - - - - - - github.com/urfave/cli - v1.19.1 - - - - - - golang.org/x/crypto - v0.7.0 - - - - - - golang.org/x/net - v0.8.0 - - - - - - golang.org/x/oauth2 - v0.6.0 - - - - - - golang.org/x/sys - v0.6.0 - - - - - - golang.org/x/term - v0.6.0 - - - - - - golang.org/x/text - v0.8.0 - - - - - - golang.org/x/time - v0.3.0 - - - - - - google.golang.org/protobuf - v1.30.0 - - - - - - gopkg.in/inf.v0 - v0.9.1 - - - - - - gopkg.in/yaml.v2 - v2.4.0 - - - - - - k8s.io/api - v0.19.1 - - - - - - k8s.io/apimachinery - v0.19.1 - - - - - - k8s.io/client-go - v0.19.1 - - - - - - k8s.io/klog/v2 - v2.3.0 - - - - - - k8s.io/kube-openapi - v0.0.0-20200805222855-6aeccd4b50c6 - - - - - - k8s.io/utils - v0.0.0-20200729134348-d5654de09c73 - - - - - - sigs.k8s.io/sig-storage-lib-external-provisioner/v8 - v8.0.0 - - - - - - sigs.k8s.io/structured-merge-diff/v4 - v4.0.1 - - - - - - sigs.k8s.io/yaml - v1.2.0 - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + -
ID + + + + Name + + + + Version + + + + SrcName + + + + SrcVersion + + + +
base-files@11.1+deb11u10base-files11.1+deb11u10base-files11.1+deb11u10
netbase@6.3netbase6.3netbase6.3
tzdata@2024a-0+deb11u1tzdata2024atzdata2024a
-
+ + +
+

coredns

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Package + + + + Vulnerability ID + + + + Severity + + + + Installed Version + + + + Fixed Version + + + + Links + + + +
github.com/golang-jwt/jwt/v4CVE-2024-51744LOWv4.5.04.5.1
github.com/quic-go/quic-goCVE-2024-53259MEDIUMv0.44.00.48.2
stdlibCVE-2024-34156HIGHv1.21.111.22.7, 1.23.1
stdlibCVE-2024-24791MEDIUMv1.21.111.21.12, 1.22.5
stdlibCVE-2024-34155MEDIUMv1.21.111.22.7, 1.23.1
stdlibCVE-2024-34158MEDIUMv1.21.111.22.7, 1.23.1
+
+

Packages

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ID + + + + Name + + + + Version + + + + SrcName + + + + SrcVersion + + + +
github.com/coredns/coredns
stdlibv1.21.11
cloud.google.com/go/compute/metadatav0.2.3
github.com/Azure/azure-sdk-for-gov68.0.0+incompatible
github.com/Azure/go-autorest/autorestv0.11.29
github.com/Azure/go-autorest/autorest/adalv0.9.22
github.com/Azure/go-autorest/autorest/azure/authv0.5.13
github.com/Azure/go-autorest/autorest/azure/cliv0.4.6
github.com/Azure/go-autorest/autorest/datev0.3.0
github.com/Azure/go-autorest/autorest/tov0.2.0
github.com/Azure/go-autorest/loggerv0.2.1
github.com/Azure/go-autorest/tracingv0.6.0
github.com/DataDog/appsec-internal-gov1.5.0
github.com/DataDog/datadog-agent/pkg/obfuscatev0.48.0
github.com/DataDog/datadog-agent/pkg/remoteconfig/statev0.48.1
github.com/DataDog/datadog-go/v5v5.3.0
github.com/DataDog/go-libddwaf/v2v2.4.2
github.com/DataDog/go-tufv1.0.2-0.5.2
github.com/DataDog/sketches-gov1.4.2
github.com/antonmedv/exprv1.15.5
github.com/apparentlymart/go-cidrv1.1.0
github.com/aws/aws-sdk-gov1.54.11
github.com/beorn7/perksv1.0.1
github.com/cespare/xxhash/v2v2.2.0
github.com/coredns/caddyv1.1.1
github.com/coreos/go-semverv0.3.0
github.com/coreos/go-systemd/v22v22.3.2
github.com/davecgh/go-spewv1.1.2-0.20180830191138-d8f796af33cc
github.com/dimchansky/utfbomv1.1.1
github.com/dnstap/golang-dnstapv0.4.0
github.com/dustin/go-humanizev1.0.1
github.com/emicklei/go-restful/v3v3.11.0
github.com/farsightsec/golang-framestreamv0.3.0
github.com/felixge/httpsnoopv1.0.4
github.com/flynn/go-shlexv0.0.0-20150515145356-3f9db97f8568
github.com/go-logr/logrv1.4.1
github.com/go-logr/stdrv1.2.2
github.com/go-openapi/jsonpointerv0.19.6
github.com/go-openapi/jsonreferencev0.20.2
github.com/go-openapi/swagv0.22.3
github.com/gogo/protobufv1.3.2
github.com/golang-jwt/jwt/v4v4.5.0
github.com/golang/groupcachev0.0.0-20210331224755-41bb18bfe9da
github.com/golang/protobufv1.5.4
github.com/google/gnostic-modelsv0.6.8
github.com/google/go-cmpv0.6.0
github.com/google/gofuzzv1.2.0
github.com/google/s2a-gov0.1.7
github.com/google/uuidv1.6.0
github.com/googleapis/enterprise-certificate-proxyv0.3.2
github.com/googleapis/gax-go/v2v2.12.3
github.com/grpc-ecosystem/grpc-opentracingv0.0.0-20180507213350-8e809c8a8645
github.com/hashicorp/errwrapv1.1.0
github.com/hashicorp/go-multierrorv1.1.1
github.com/imdario/mergov0.3.12
github.com/infobloxopen/go-treesv0.0.0-20200715205103-96a057b8dfb9
github.com/jmespath/go-jmespathv0.4.0
github.com/josharian/internv1.0.0
github.com/json-iterator/gov1.1.12
github.com/mailru/easyjsonv0.7.7
github.com/matttproud/golang_protobuf_extensionsv1.0.4
github.com/miekg/dnsv1.1.59
github.com/mitchellh/go-homedirv1.1.0
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.2
github.com/munnerz/goautonegv0.0.0-20191010083416-a7dc8b61c822
github.com/opentracing-contrib/go-observerv0.0.0-20170622124052-a52f23424492
github.com/opentracing/opentracing-gov1.2.0
github.com/openzipkin-contrib/zipkin-go-opentracingv0.5.0
github.com/openzipkin/zipkin-gov0.4.3
github.com/oschwald/geoip2-golangv1.9.0
github.com/oschwald/maxminddb-golangv1.11.0
github.com/outcaste-io/ristrettov0.2.3
github.com/philhofer/fwdv1.1.2
github.com/pkg/errorsv0.9.1
github.com/prometheus/client_golangv1.19.1
github.com/prometheus/client_modelv0.6.1
github.com/prometheus/commonv0.53.0
github.com/prometheus/procfsv0.12.0
github.com/quic-go/quic-gov0.44.0
github.com/secure-systems-lab/go-securesystemslibv0.7.0
github.com/spf13/pflagv1.0.5
github.com/tinylib/msgpv1.1.8
go.etcd.io/etcd/api/v3v3.5.13
go.etcd.io/etcd/client/pkg/v3v3.5.13
go.etcd.io/etcd/client/v3v3.5.13
go.opencensus.iov0.24.0
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttpv0.49.0
go.opentelemetry.io/otelv1.24.0
go.opentelemetry.io/otel/metricv1.24.0
go.opentelemetry.io/otel/tracev1.24.0
go.uber.org/atomicv1.11.0
go.uber.org/multierrv1.6.0
go.uber.org/zapv1.17.0
golang.org/x/cryptov0.23.0
golang.org/x/expv0.0.0-20240506185415-9bf2ced13842
golang.org/x/netv0.25.0
golang.org/x/oauth2v0.18.0
golang.org/x/sysv0.20.0
golang.org/x/termv0.20.0
golang.org/x/textv0.15.0
golang.org/x/timev0.5.0
golang.org/x/xerrorsv0.0.0-20220907171357-04be3eba64a2
google.golang.org/apiv0.172.0
google.golang.org/genproto/googleapis/apiv0.0.0-20240311132316-a219d84964c2
google.golang.org/genproto/googleapis/rpcv0.0.0-20240415180920-8c6c420018be
google.golang.org/grpcv1.63.2
google.golang.org/protobufv1.33.0
gopkg.in/DataDog/dd-trace-go.v1v1.64.0
gopkg.in/inf.v0v0.9.1
gopkg.in/yaml.v2v2.4.0
gopkg.in/yaml.v3v3.0.1
k8s.io/apiv0.29.3
k8s.io/apimachineryv0.29.3
k8s.io/client-gov0.29.3
k8s.io/klog/v2v2.120.1
k8s.io/kube-openapiv0.0.0-20231010175941-2dd684a91f00
k8s.io/utilsv0.0.0-20230726121419-3b25d923346b
sigs.k8s.io/jsonv0.0.0-20221116044647-bc3834ca7abd
sigs.k8s.io/structured-merge-diff/v4v4.4.1
sigs.k8s.io/yamlv1.3.0
+ +
+

usr/local/bin/kube-scheduler

+
+ + + + + + + + + + + + + + + + + + + + + +
Package + + + + Vulnerability ID + + + + Severity + + + + Installed Version + + + + Fixed Version + + + + Links + + + +
github.com/opencontainers/runcCVE-2024-45310MEDIUMv1.1.131.1.14, 1.2.0-rc.3
+
+

Packages

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ID + + + + Name + + + + Version + + + + SrcName + + + + SrcVersion + + + +
k8s.io/kubernetes
stdlibv1.22.8
github.com/NYTimes/gziphandlerv1.1.1
github.com/antlr4-go/antlr/v4v4.13.0
github.com/asaskevich/govalidatorv0.0.0-20190424111038-f61b66f89f4a
github.com/beorn7/perksv1.0.1
github.com/blang/semver/v4v4.0.0
github.com/cenkalti/backoff/v4v4.3.0
github.com/cespare/xxhash/v2v2.3.0
github.com/coreos/go-semverv0.3.1
github.com/coreos/go-systemd/v22v22.5.0
github.com/davecgh/go-spewv1.1.2-0.20180830191138-d8f796af33cc
github.com/distribution/referencev0.5.0
github.com/emicklei/go-restful/v3v3.11.0
github.com/felixge/httpsnoopv1.0.4
github.com/fsnotify/fsnotifyv1.7.0
github.com/fxamacker/cbor/v2v2.7.0
github.com/go-logr/logrv1.4.2
github.com/go-logr/stdrv1.2.2
github.com/go-logr/zaprv1.3.0
github.com/go-openapi/jsonpointerv0.19.6
github.com/go-openapi/jsonreferencev0.20.2
github.com/go-openapi/swagv0.22.4
github.com/gogo/protobufv1.3.2
github.com/golang/groupcachev0.0.0-20210331224755-41bb18bfe9da
github.com/golang/protobufv1.5.4
github.com/google/cel-gov0.20.1
github.com/google/gnostic-modelsv0.6.8
github.com/google/go-cmpv0.6.0
github.com/google/gofuzzv1.2.0
github.com/google/uuidv1.6.0
github.com/grpc-ecosystem/go-grpc-prometheusv1.2.0
github.com/grpc-ecosystem/grpc-gateway/v2v2.20.0
github.com/imdario/mergov0.3.6
github.com/josharian/internv1.0.0
github.com/json-iterator/gov1.1.12
github.com/mailru/easyjsonv0.7.7
github.com/moby/sys/mountinfov0.7.1
github.com/moby/termv0.5.0
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.2
github.com/munnerz/goautonegv0.0.0-20191010083416-a7dc8b61c822
github.com/opencontainers/go-digestv1.0.0
github.com/opencontainers/runcv1.1.13
github.com/opencontainers/selinuxv1.11.0
github.com/pkg/errorsv0.9.1
github.com/prometheus/client_golangv1.19.1
github.com/prometheus/client_modelv0.6.1
github.com/prometheus/commonv0.55.0
github.com/prometheus/procfsv0.15.1
github.com/spf13/cobrav1.8.1
github.com/spf13/pflagv1.0.5
github.com/stoewer/go-strcasev1.2.0
github.com/x448/float16v0.8.4
go.etcd.io/etcd/api/v3v3.5.14
go.etcd.io/etcd/client/pkg/v3v3.5.14
go.etcd.io/etcd/client/v3v3.5.14
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpcv0.53.0
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttpv0.53.0
go.opentelemetry.io/otelv1.28.0
go.opentelemetry.io/otel/exporters/otlp/otlptracev1.28.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpcv1.27.0
go.opentelemetry.io/otel/metricv1.28.0
go.opentelemetry.io/otel/sdkv1.28.0
go.opentelemetry.io/otel/tracev1.28.0
go.opentelemetry.io/proto/otlpv1.3.1
go.uber.org/multierrv1.11.0
go.uber.org/zapv1.26.0
golang.org/x/cryptov0.24.0
golang.org/x/expv0.0.0-20230515195305-f3d0a9c9a5cc
golang.org/x/netv0.26.0
golang.org/x/oauth2v0.21.0
golang.org/x/syncv0.7.0
golang.org/x/sysv0.21.0
golang.org/x/termv0.21.0
golang.org/x/textv0.16.0
golang.org/x/timev0.3.0
google.golang.org/genproto/googleapis/apiv0.0.0-20240528184218-531527333157
google.golang.org/genproto/googleapis/rpcv0.0.0-20240701130421-f6361c86f094
google.golang.org/grpcv1.65.0
google.golang.org/protobufv1.34.2
gopkg.in/evanphx/json-patch.v4v4.12.0
gopkg.in/inf.v0v0.9.1
gopkg.in/natefinch/lumberjack.v2v2.2.1
gopkg.in/yaml.v2v2.4.0
gopkg.in/yaml.v3v3.0.1
k8s.io/api
k8s.io/apiextensions-apiserver
k8s.io/apimachinery
k8s.io/apiserver
k8s.io/client-go
k8s.io/cloud-provider
k8s.io/component-base
k8s.io/component-helpers
k8s.io/controller-manager
k8s.io/csi-translation-lib
k8s.io/dynamic-resource-allocation
k8s.io/klog/v2v2.130.1
k8s.io/kms
k8s.io/kube-openapiv0.0.0-20240228011516-70dd3763d340
k8s.io/kube-scheduler
k8s.io/kubelet
k8s.io/mount-utils
k8s.io/utilsv0.0.0-20240711033017-18e509b52bc8
sigs.k8s.io/apiserver-network-proxy/konnectivity-clientv0.30.3
sigs.k8s.io/jsonv0.0.0-20221116044647-bc3834ca7abd
sigs.k8s.io/structured-merge-diff/v4v4.4.1
sigs.k8s.io/yamlv1.4.0
+ +
+

docker.io/kindest/kindnetd:v20241023-a345ebe4 (debian 12.5)

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Package + + + + Vulnerability ID + + + + Severity + + + + Installed Version + + + + Fixed Version + + + + Links + + + +
coreutilsCVE-2016-2781LOW9.1-1
coreutilsCVE-2017-18018LOW9.1-1
iptablesCVE-2012-2663LOW1.8.9-2
libc6CVE-2010-4756LOW2.36-9+deb12u7
libc6CVE-2018-20796LOW2.36-9+deb12u7
libc6CVE-2019-1010022LOW2.36-9+deb12u7
libc6CVE-2019-1010023LOW2.36-9+deb12u7
libc6CVE-2019-1010024LOW2.36-9+deb12u7
libc6CVE-2019-1010025LOW2.36-9+deb12u7
libc6CVE-2019-9192LOW2.36-9+deb12u7
libip4tc2CVE-2012-2663LOW1.8.9-2
libip6tc2CVE-2012-2663LOW1.8.9-2
libjansson4CVE-2020-36325LOW2.14-2
libssl3CVE-2023-5678MEDIUM3.0.11-1~deb12u23.0.13-1~deb12u1
libssl3CVE-2023-6129MEDIUM3.0.11-1~deb12u23.0.13-1~deb12u1
libssl3CVE-2023-6237MEDIUM3.0.11-1~deb12u23.0.13-1~deb12u1
libssl3CVE-2024-0727MEDIUM3.0.11-1~deb12u23.0.13-1~deb12u1
libssl3CVE-2024-4603MEDIUM3.0.11-1~deb12u23.0.14-1~deb12u1
libssl3CVE-2024-4741MEDIUM3.0.11-1~deb12u23.0.14-1~deb12u1
libssl3CVE-2024-5535MEDIUM3.0.11-1~deb12u23.0.15-1~deb12u1
libssl3CVE-2024-6119MEDIUM3.0.11-1~deb12u23.0.14-1~deb12u2
libssl3CVE-2024-2511LOW3.0.11-1~deb12u23.0.14-1~deb12u1
libssl3CVE-2024-9143LOW3.0.11-1~deb12u23.0.15-1~deb12u1
libxtables12CVE-2012-2663LOW1.8.9-2
+
+

Packages

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ID + + + + Name + + + + Version + + + + SrcName + + + + SrcVersion + + + +
base-files@12.4+deb12u5base-files12.4+deb12u5base-files12.4+deb12u5
conntrack@1:1.4.7-1+b2conntrack1.4.7conntrack-tools1.4.7
coreutils@9.1-1coreutils9.1coreutils9.1
ebtables@2.0.11-5ebtables2.0.11ebtables2.0.11
ipset@7.17-1ipset7.17ipset7.17
iptables@1.8.9-2iptables1.8.9iptables1.8.9
kmod@30+20221128-1kmod30+20221128kmod30+20221128
libbsd0@0.11.7-2libbsd00.11.7libbsd0.11.7
libc6@2.36-9+deb12u7libc62.36glibc2.36
libedit2@3.1-20221030-2libedit23.1-20221030libedit3.1-20221030
libgmp10@2:6.2.1+dfsg1-1.1libgmp106.2.1+dfsg1gmp6.2.1+dfsg1
libip4tc2@1.8.9-2libip4tc21.8.9iptables1.8.9
libip6tc2@1.8.9-2libip6tc21.8.9iptables1.8.9
libipset13@7.17-1libipset137.17ipset7.17
libjansson4@2.14-2libjansson42.14jansson2.14
libkmod2@30+20221128-1libkmod230+20221128kmod30+20221128
libmd0@1.0.4-2libmd01.0.4libmd1.0.4
libmnl0@1.0.4-3libmnl01.0.4libmnl1.0.4
libnetfilter-conntrack3@1.0.9-3libnetfilter-conntrack31.0.9libnetfilter-conntrack1.0.9
libnfnetlink0@1.0.2-2libnfnetlink01.0.2libnfnetlink1.0.2
libnftables1@1.0.6-2+deb12u2libnftables11.0.6nftables1.0.6
libnftnl11@1.2.4-2libnftnl111.2.4libnftnl1.2.4
libpcre2-8-0@10.42-1libpcre2-8-010.42pcre210.42
libssl3@3.0.11-1~deb12u2libssl33.0.11openssl3.0.11
libxtables12@1.8.9-2libxtables121.8.9iptables1.8.9
libzstd1@1.5.4+dfsg2-5libzstd11.5.4+dfsg2libzstd1.5.4+dfsg2
netbase@6.4netbase6.4netbase6.4
nftables@1.0.6-2+deb12u2nftables1.0.6nftables1.0.6
tzdata@2024a-0+deb12u1tzdata2024atzdata2024a
+ +
+

bin/kindnetd

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Package + + + + Vulnerability ID + + + + Severity + + + + Installed Version + + + + Fixed Version + + + + Links + + + +
stdlibCVE-2024-34156HIGHv1.22.61.22.7, 1.23.1
stdlibCVE-2024-34155MEDIUMv1.22.61.22.7, 1.23.1
stdlibCVE-2024-34158MEDIUMv1.22.61.22.7, 1.23.1
+
+

Packages

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ID + + + + Name + + + + Version + + + + SrcName + + + + SrcVersion + + + +
sigs.k8s.io/kind/images/kindnetd
stdlibv1.22.6
github.com/beorn7/perksv1.0.1
github.com/cespare/xxhash/v2v2.3.0
github.com/coreos/go-iptablesv0.8.0
github.com/davecgh/go-spewv1.1.2-0.20180830191138-d8f796af33cc
github.com/emicklei/go-restful/v3v3.12.1
github.com/florianl/go-nfqueuev1.3.2
github.com/fxamacker/cbor/v2v2.7.0
github.com/go-logr/logrv1.4.2
github.com/go-openapi/jsonpointerv0.21.0
github.com/go-openapi/jsonreferencev0.21.0
github.com/go-openapi/swagv0.23.0
github.com/gogo/protobufv1.3.2
github.com/golang/groupcachev0.0.0-20210331224755-41bb18bfe9da
github.com/golang/protobufv1.5.4
github.com/google/gnostic-modelsv0.6.8
github.com/google/go-cmpv0.6.0
github.com/google/gofuzzv1.2.0
github.com/google/uuidv1.6.0
github.com/josharian/internv1.0.0
github.com/josharian/nativev1.1.0
github.com/json-iterator/gov1.1.12
github.com/mailru/easyjsonv0.7.7
github.com/mdlayher/netlinkv1.7.2
github.com/mdlayher/socketv0.5.1
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.2
github.com/munnerz/goautonegv0.0.0-20191010083416-a7dc8b61c822
github.com/prometheus/client_golangv1.20.5
github.com/prometheus/client_modelv0.6.1
github.com/prometheus/commonv0.60.0
github.com/prometheus/procfsv0.15.1
github.com/vishvananda/netlinkv1.3.0
github.com/vishvananda/netnsv0.0.4
github.com/x448/float16v0.8.4
golang.org/x/netv0.30.0
golang.org/x/oauth2v0.23.0
golang.org/x/syncv0.8.0
golang.org/x/sysv0.26.0
golang.org/x/termv0.25.0
golang.org/x/textv0.19.0
golang.org/x/timev0.7.0
google.golang.org/protobufv1.35.1
gopkg.in/inf.v0v0.9.1
gopkg.in/yaml.v2v2.4.0
gopkg.in/yaml.v3v3.0.1
k8s.io/apiv0.31.1
k8s.io/apimachineryv0.31.1
k8s.io/client-gov0.31.1
k8s.io/klog/v2v2.130.1
k8s.io/kube-openapiv0.0.0-20240903163716-9e1beecbcb38
k8s.io/utilsv0.0.0-20240921022957-49e7df575cb6
sigs.k8s.io/jsonv0.0.0-20221116044647-bc3834ca7abd
sigs.k8s.io/knftablesv0.0.17
sigs.k8s.io/kube-network-policiesv0.6.1-0.20241023163654-4320aa92e3f0
sigs.k8s.io/network-policy-apiv0.1.5
sigs.k8s.io/structured-merge-diff/v4v4.4.1
sigs.k8s.io/yamlv1.4.0
+ +
+

go-runner

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Package + + + + Vulnerability ID + + + + Severity + + + + Installed Version + + + + Fixed Version + + + + Links + + + +
stdlibCVE-2024-34156HIGHv1.22.41.22.7, 1.23.1
stdlibCVE-2024-24791MEDIUMv1.22.41.21.12, 1.22.5
stdlibCVE-2024-34155MEDIUMv1.22.41.22.7, 1.23.1
stdlibCVE-2024-34158MEDIUMv1.22.41.22.7, 1.23.1
+
+

Packages

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ID + + + + Name + + + + Version + + + + SrcName + + + + SrcVersion + + + +
k8s.io/release/images/build/go-runner
stdlibv1.22.4
+ +
+

registry.k8s.io/kube-proxy:v1.31.2 (debian 12.7)

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Package + + + + Vulnerability ID + + + + Severity + + + + Installed Version + + + + Fixed Version + + + + Links + + + +
coreutilsCVE-2016-2781LOW9.1-1
coreutilsCVE-2017-18018LOW9.1-1
iptablesCVE-2012-2663LOW1.8.9-2
libc6CVE-2010-4756LOW2.36-9+deb12u8
libc6CVE-2018-20796LOW2.36-9+deb12u8
libc6CVE-2019-1010022LOW2.36-9+deb12u8
libc6CVE-2019-1010023LOW2.36-9+deb12u8
libc6CVE-2019-1010024LOW2.36-9+deb12u8
libc6CVE-2019-1010025LOW2.36-9+deb12u8
libc6CVE-2019-9192LOW2.36-9+deb12u8
libip4tc2CVE-2012-2663LOW1.8.9-2
libip6tc2CVE-2012-2663LOW1.8.9-2
libjansson4CVE-2020-36325LOW2.14-2
libssl3CVE-2024-5535MEDIUM3.0.14-1~deb12u23.0.15-1~deb12u1
libssl3CVE-2024-9143LOW3.0.14-1~deb12u23.0.15-1~deb12u1
libxtables12CVE-2012-2663LOW1.8.9-2
+
+

Packages

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ID + + + + Name + + + + Version + + + + SrcName + + + + SrcVersion + + + +
base-files@12.4+deb12u7base-files12.4+deb12u7base-files12.4+deb12u7
conntrack@1:1.4.7-1+b2conntrack1.4.7conntrack-tools1.4.7
coreutils@9.1-1coreutils9.1coreutils9.1
ebtables@2.0.11-5ebtables2.0.11ebtables2.0.11
ipset@7.17-1ipset7.17ipset7.17
iptables@1.8.9-2iptables1.8.9iptables1.8.9
kmod@30+20221128-1kmod30+20221128kmod30+20221128
libbsd0@0.11.7-2libbsd00.11.7libbsd0.11.7
libc6@2.36-9+deb12u8libc62.36glibc2.36
libedit2@3.1-20221030-2libedit23.1-20221030libedit3.1-20221030
libgmp10@2:6.2.1+dfsg1-1.1libgmp106.2.1+dfsg1gmp6.2.1+dfsg1
libip4tc2@1.8.9-2libip4tc21.8.9iptables1.8.9
libip6tc2@1.8.9-2libip6tc21.8.9iptables1.8.9
libipset13@7.17-1libipset137.17ipset7.17
libjansson4@2.14-2libjansson42.14jansson2.14
libkmod2@30+20221128-1libkmod230+20221128kmod30+20221128
libmd0@1.0.4-2libmd01.0.4libmd1.0.4
libmnl0@1.0.4-3libmnl01.0.4libmnl1.0.4
libnetfilter-conntrack3@1.0.9-3libnetfilter-conntrack31.0.9libnetfilter-conntrack1.0.9
libnfnetlink0@1.0.2-2libnfnetlink01.0.2libnfnetlink1.0.2
libnftables1@1.0.6-2+deb12u2libnftables11.0.6nftables1.0.6
libnftnl11@1.2.4-2libnftnl111.2.4libnftnl1.2.4
libpcre2-8-0@10.42-1libpcre2-8-010.42pcre210.42
libssl3@3.0.14-1~deb12u2libssl33.0.14openssl3.0.14
libxtables12@1.8.9-2libxtables121.8.9iptables1.8.9
libzstd1@1.5.4+dfsg2-5libzstd11.5.4+dfsg2libzstd1.5.4+dfsg2
netbase@6.4netbase6.4netbase6.4
nftables@1.0.6-2+deb12u2nftables1.0.6nftables1.0.6
tzdata@2024a-0+deb12u1tzdata2024atzdata2024a
+ +
+

usr/local/bin/kube-proxy

+
+ + + + + + + + + + + + + + + + + + + + + +
Package + + + + Vulnerability ID + + + + Severity + + + + Installed Version + + + + Fixed Version + + + + Links + + + +
github.com/opencontainers/runcCVE-2024-45310MEDIUMv1.1.131.1.14, 1.2.0-rc.3
+
+

Packages

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ID + + + + Name + + + + Version + + + + SrcName + + + + SrcVersion + + + +
k8s.io/kubernetes
stdlibv1.22.8
github.com/NYTimes/gziphandlerv1.1.1
github.com/antlr4-go/antlr/v4v4.13.0
github.com/asaskevich/govalidatorv0.0.0-20190424111038-f61b66f89f4a
github.com/beorn7/perksv1.0.1
github.com/blang/semver/v4v4.0.0
github.com/cenkalti/backoff/v4v4.3.0
github.com/cespare/xxhash/v2v2.3.0
github.com/coreos/go-semverv0.3.1
github.com/coreos/go-systemd/v22v22.5.0
github.com/cyphar/filepath-securejoinv0.2.4
github.com/davecgh/go-spewv1.1.2-0.20180830191138-d8f796af33cc
github.com/distribution/referencev0.5.0
github.com/emicklei/go-restful/v3v3.11.0
github.com/felixge/httpsnoopv1.0.4
github.com/fsnotify/fsnotifyv1.7.0
github.com/fxamacker/cbor/v2v2.7.0
github.com/go-logr/logrv1.4.2
github.com/go-logr/stdrv1.2.2
github.com/go-logr/zaprv1.3.0
github.com/go-openapi/jsonpointerv0.19.6
github.com/go-openapi/jsonreferencev0.20.2
github.com/go-openapi/swagv0.22.4
github.com/godbus/dbus/v5v5.1.0
github.com/gogo/protobufv1.3.2
github.com/golang/groupcachev0.0.0-20210331224755-41bb18bfe9da
github.com/golang/protobufv1.5.4
github.com/google/cadvisorv0.49.0
github.com/google/cel-gov0.20.1
github.com/google/gnostic-modelsv0.6.8
github.com/google/go-cmpv0.6.0
github.com/google/gofuzzv1.2.0
github.com/google/uuidv1.6.0
github.com/grpc-ecosystem/go-grpc-prometheusv1.2.0
github.com/grpc-ecosystem/grpc-gateway/v2v2.20.0
github.com/imdario/mergov0.3.6
github.com/josharian/internv1.0.0
github.com/json-iterator/gov1.1.12
github.com/lithammer/dedentv1.1.0
github.com/mailru/easyjsonv0.7.7
github.com/mistifyio/go-zfsv2.1.2-0.20190413222219-f784269be439+incompatible
github.com/moby/ipvsv1.1.0
github.com/moby/sys/mountinfov0.7.1
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.2
github.com/munnerz/goautonegv0.0.0-20191010083416-a7dc8b61c822
github.com/opencontainers/go-digestv1.0.0
github.com/opencontainers/runcv1.1.13
github.com/opencontainers/runtime-specv1.0.3-0.20220909204839-494a5a6aca78
github.com/pkg/errorsv0.9.1
github.com/prometheus/client_golangv1.19.1
github.com/prometheus/client_modelv0.6.1
github.com/prometheus/commonv0.55.0
github.com/prometheus/procfsv0.15.1
github.com/sirupsen/logrusv1.9.3
github.com/spf13/cobrav1.8.1
github.com/spf13/pflagv1.0.5
github.com/stoewer/go-strcasev1.2.0
github.com/vishvananda/netlinkv1.1.0
github.com/vishvananda/netnsv0.0.4
github.com/x448/float16v0.8.4
go.etcd.io/etcd/api/v3v3.5.14
go.etcd.io/etcd/client/pkg/v3v3.5.14
go.etcd.io/etcd/client/v3v3.5.14
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpcv0.53.0
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttpv0.53.0
go.opentelemetry.io/otelv1.28.0
go.opentelemetry.io/otel/exporters/otlp/otlptracev1.28.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpcv1.27.0
go.opentelemetry.io/otel/metricv1.28.0
go.opentelemetry.io/otel/sdkv1.28.0
go.opentelemetry.io/otel/tracev1.28.0
go.opentelemetry.io/proto/otlpv1.3.1
go.uber.org/multierrv1.11.0
go.uber.org/zapv1.26.0
golang.org/x/cryptov0.24.0
golang.org/x/expv0.0.0-20230515195305-f3d0a9c9a5cc
golang.org/x/netv0.26.0
golang.org/x/oauth2v0.21.0
golang.org/x/syncv0.7.0
golang.org/x/sysv0.21.0
golang.org/x/termv0.21.0
golang.org/x/textv0.16.0
golang.org/x/timev0.3.0
google.golang.org/genproto/googleapis/apiv0.0.0-20240528184218-531527333157
google.golang.org/genproto/googleapis/rpcv0.0.0-20240701130421-f6361c86f094
google.golang.org/grpcv1.65.0
google.golang.org/protobufv1.34.2
gopkg.in/evanphx/json-patch.v4v4.12.0
gopkg.in/inf.v0v0.9.1
gopkg.in/natefinch/lumberjack.v2v2.2.1
gopkg.in/yaml.v2v2.4.0
gopkg.in/yaml.v3v3.0.1
k8s.io/api
k8s.io/apiextensions-apiserver
k8s.io/apimachinery
k8s.io/apiserver
k8s.io/client-go
k8s.io/cloud-provider
k8s.io/component-base
k8s.io/component-helpers
k8s.io/controller-manager
k8s.io/cri-api
k8s.io/cri-client
k8s.io/klog/v2v2.130.1
k8s.io/kms
k8s.io/kube-openapiv0.0.0-20240228011516-70dd3763d340
k8s.io/kube-proxy
k8s.io/kubelet
k8s.io/mount-utils
k8s.io/utilsv0.0.0-20240711033017-18e509b52bc8
sigs.k8s.io/apiserver-network-proxy/konnectivity-clientv0.30.3
sigs.k8s.io/jsonv0.0.0-20221116044647-bc3834ca7abd
sigs.k8s.io/knftablesv0.0.17
sigs.k8s.io/structured-merge-diff/v4v4.4.1
sigs.k8s.io/yamlv1.4.0
+ +
+

usr/local/bin/kube-apiserver

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Package + + + + Vulnerability ID + + + + Severity + + + + Installed Version + + + + Fixed Version + + + + Links + + + +
github.com/opencontainers/runcCVE-2024-45310MEDIUMv1.1.131.1.14, 1.2.0-rc.3
gopkg.in/square/go-jose.v2CVE-2024-28180MEDIUMv2.6.0
+
+

Packages

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ID + + + + Name + + + + Version + + + + SrcName + + + + SrcVersion + + + +
k8s.io/kubernetes
stdlibv1.22.8
github.com/NYTimes/gziphandlerv1.1.1
github.com/antlr4-go/antlr/v4v4.13.0
github.com/asaskevich/govalidatorv0.0.0-20190424111038-f61b66f89f4a
github.com/beorn7/perksv1.0.1
github.com/blang/semver/v4v4.0.0
github.com/cenkalti/backoff/v4v4.3.0
github.com/cespare/xxhash/v2v2.3.0
github.com/coreos/go-oidcv2.2.1+incompatible
github.com/coreos/go-semverv0.3.1
github.com/coreos/go-systemd/v22v22.5.0
github.com/davecgh/go-spewv1.1.2-0.20180830191138-d8f796af33cc
github.com/distribution/referencev0.5.0
github.com/emicklei/go-restful/v3v3.11.0
github.com/felixge/httpsnoopv1.0.4
github.com/fsnotify/fsnotifyv1.7.0
github.com/fxamacker/cbor/v2v2.7.0
github.com/go-logr/logrv1.4.2
github.com/go-logr/stdrv1.2.2
github.com/go-logr/zaprv1.3.0
github.com/go-openapi/jsonpointerv0.19.6
github.com/go-openapi/jsonreferencev0.20.2
github.com/go-openapi/swagv0.22.4
github.com/gogo/protobufv1.3.2
github.com/golang/groupcachev0.0.0-20210331224755-41bb18bfe9da
github.com/golang/protobufv1.5.4
github.com/google/cel-gov0.20.1
github.com/google/gnostic-modelsv0.6.8
github.com/google/go-cmpv0.6.0
github.com/google/gofuzzv1.2.0
github.com/google/uuidv1.6.0
github.com/gorilla/websocketv1.5.0
github.com/grpc-ecosystem/go-grpc-prometheusv1.2.0
github.com/grpc-ecosystem/grpc-gateway/v2v2.20.0
github.com/imdario/mergov0.3.6
github.com/josharian/internv1.0.0
github.com/json-iterator/gov1.1.12
github.com/mailru/easyjsonv0.7.7
github.com/moby/spdystreamv0.4.0
github.com/moby/sys/mountinfov0.7.1
github.com/moby/termv0.5.0
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.2
github.com/munnerz/goautonegv0.0.0-20191010083416-a7dc8b61c822
github.com/mxk/go-flowratev0.0.0-20140419014527-cca7078d478f
github.com/opencontainers/go-digestv1.0.0
github.com/opencontainers/runcv1.1.13
github.com/opencontainers/selinuxv1.11.0
github.com/pkg/errorsv0.9.1
github.com/pquerna/cachecontrolv0.1.0
github.com/prometheus/client_golangv1.19.1
github.com/prometheus/client_modelv0.6.1
github.com/prometheus/commonv0.55.0
github.com/prometheus/procfsv0.15.1
github.com/robfig/cron/v3v3.0.1
github.com/spf13/cobrav1.8.1
github.com/spf13/pflagv1.0.5
github.com/stoewer/go-strcasev1.2.0
github.com/x448/float16v0.8.4
go.etcd.io/etcd/api/v3v3.5.14
go.etcd.io/etcd/client/pkg/v3v3.5.14
go.etcd.io/etcd/client/v3v3.5.14
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpcv0.53.0
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttpv0.53.0
go.opentelemetry.io/otelv1.28.0
go.opentelemetry.io/otel/exporters/otlp/otlptracev1.28.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpcv1.27.0
go.opentelemetry.io/otel/metricv1.28.0
go.opentelemetry.io/otel/sdkv1.28.0
go.opentelemetry.io/otel/tracev1.28.0
go.opentelemetry.io/proto/otlpv1.3.1
go.uber.org/multierrv1.11.0
go.uber.org/zapv1.26.0
golang.org/x/cryptov0.24.0
golang.org/x/expv0.0.0-20230515195305-f3d0a9c9a5cc
golang.org/x/netv0.26.0
golang.org/x/oauth2v0.21.0
golang.org/x/syncv0.7.0
golang.org/x/sysv0.21.0
golang.org/x/termv0.21.0
golang.org/x/textv0.16.0
golang.org/x/timev0.3.0
golang.org/x/toolsv0.21.1-0.20240508182429-e35e4ccd0d2d
google.golang.org/genproto/googleapis/apiv0.0.0-20240528184218-531527333157
google.golang.org/genproto/googleapis/rpcv0.0.0-20240701130421-f6361c86f094
google.golang.org/grpcv1.65.0
google.golang.org/protobufv1.34.2
gopkg.in/evanphx/json-patch.v4v4.12.0
gopkg.in/inf.v0v0.9.1
gopkg.in/natefinch/lumberjack.v2v2.2.1
gopkg.in/square/go-jose.v2v2.6.0
gopkg.in/yaml.v2v2.4.0
gopkg.in/yaml.v3v3.0.1
k8s.io/api
k8s.io/apiextensions-apiserver
k8s.io/apimachinery
k8s.io/apiserver
k8s.io/client-go
k8s.io/cloud-provider
k8s.io/cluster-bootstrap
k8s.io/component-base
k8s.io/component-helpers
k8s.io/controller-manager
k8s.io/dynamic-resource-allocation
k8s.io/klog/v2v2.130.1
k8s.io/kms
k8s.io/kube-aggregator
k8s.io/kube-openapiv0.0.0-20240228011516-70dd3763d340
k8s.io/kubelet
k8s.io/mount-utils
k8s.io/pod-security-admission
k8s.io/utilsv0.0.0-20240711033017-18e509b52bc8
sigs.k8s.io/apiserver-network-proxy/konnectivity-clientv0.30.3
sigs.k8s.io/jsonv0.0.0-20221116044647-bc3834ca7abd
sigs.k8s.io/structured-merge-diff/v4v4.4.1
sigs.k8s.io/yamlv1.4.0
+ +
+

usr/local/bin/kube-controller-manager

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Package + + + + Vulnerability ID + + + + Severity + + + + Installed Version + + + + Fixed Version + + + + Links + + + +
github.com/opencontainers/runcCVE-2024-45310MEDIUMv1.1.131.1.14, 1.2.0-rc.3
gopkg.in/square/go-jose.v2CVE-2024-28180MEDIUMv2.6.0
+
+

Packages

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ID + + + + Name + + + + Version + + + + SrcName + + + + SrcVersion + + + +
k8s.io/kubernetes
stdlibv1.22.8
github.com/NYTimes/gziphandlerv1.1.1
github.com/antlr4-go/antlr/v4v4.13.0
github.com/asaskevich/govalidatorv0.0.0-20190424111038-f61b66f89f4a
github.com/beorn7/perksv1.0.1
github.com/blang/semver/v4v4.0.0
github.com/cenkalti/backoff/v4v4.3.0
github.com/cespare/xxhash/v2v2.3.0
github.com/checkpoint-restore/go-criu/v5v5.3.0
github.com/cilium/ebpfv0.9.1
github.com/container-storage-interface/specv1.9.0
github.com/containerd/consolev1.0.3
github.com/containerd/ttrpcv1.2.2
github.com/coreos/go-oidcv2.2.1+incompatible
github.com/coreos/go-semverv0.3.1
github.com/coreos/go-systemd/v22v22.5.0
github.com/cyphar/filepath-securejoinv0.2.4
github.com/davecgh/go-spewv1.1.2-0.20180830191138-d8f796af33cc
github.com/distribution/referencev0.5.0
github.com/docker/go-unitsv0.5.0
github.com/emicklei/go-restful/v3v3.11.0
github.com/euank/go-kmsg-parserv2.0.0+incompatible
github.com/felixge/httpsnoopv1.0.4
github.com/fsnotify/fsnotifyv1.7.0
github.com/fxamacker/cbor/v2v2.7.0
github.com/go-logr/logrv1.4.2
github.com/go-logr/stdrv1.2.2
github.com/go-logr/zaprv1.3.0
github.com/go-openapi/jsonpointerv0.19.6
github.com/go-openapi/jsonreferencev0.20.2
github.com/go-openapi/swagv0.22.4
github.com/godbus/dbus/v5v5.1.0
github.com/gogo/protobufv1.3.2
github.com/golang/groupcachev0.0.0-20210331224755-41bb18bfe9da
github.com/golang/protobufv1.5.4
github.com/google/cadvisorv0.49.0
github.com/google/cel-gov0.20.1
github.com/google/gnostic-modelsv0.6.8
github.com/google/go-cmpv0.6.0
github.com/google/gofuzzv1.2.0
github.com/google/uuidv1.6.0
github.com/gorilla/websocketv1.5.0
github.com/grpc-ecosystem/go-grpc-prometheusv1.2.0
github.com/grpc-ecosystem/grpc-gateway/v2v2.20.0
github.com/imdario/mergov0.3.6
github.com/josharian/internv1.0.0
github.com/json-iterator/gov1.1.12
github.com/karrick/godirwalkv1.17.0
github.com/libopenstorage/openstoragev1.0.0
github.com/mailru/easyjsonv0.7.7
github.com/mistifyio/go-zfsv2.1.2-0.20190413222219-f784269be439+incompatible
github.com/moby/spdystreamv0.4.0
github.com/moby/sys/mountinfov0.7.1
github.com/moby/termv0.5.0
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.2
github.com/mohae/deepcopyv0.0.0-20170603005431-491d3605edfb
github.com/mrunalp/fileutilsv0.5.1
github.com/munnerz/goautonegv0.0.0-20191010083416-a7dc8b61c822
github.com/mxk/go-flowratev0.0.0-20140419014527-cca7078d478f
github.com/opencontainers/go-digestv1.0.0
github.com/opencontainers/runcv1.1.13
github.com/opencontainers/runtime-specv1.0.3-0.20220909204839-494a5a6aca78
github.com/opencontainers/selinuxv1.11.0
github.com/pkg/errorsv0.9.1
github.com/pquerna/cachecontrolv0.1.0
github.com/prometheus/client_golangv1.19.1
github.com/prometheus/client_modelv0.6.1
github.com/prometheus/commonv0.55.0
github.com/prometheus/procfsv0.15.1
github.com/robfig/cron/v3v3.0.1
github.com/sirupsen/logrusv1.9.3
github.com/spf13/cobrav1.8.1
github.com/spf13/pflagv1.0.5
github.com/stoewer/go-strcasev1.2.0
github.com/syndtr/gocapabilityv0.0.0-20200815063812-42c35b437635
github.com/vishvananda/netlinkv1.1.0
github.com/vishvananda/netnsv0.0.4
github.com/x448/float16v0.8.4
go.etcd.io/etcd/api/v3v3.5.14
go.etcd.io/etcd/client/pkg/v3v3.5.14
go.etcd.io/etcd/client/v3v3.5.14
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpcv0.53.0
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttpv0.53.0
go.opentelemetry.io/otelv1.28.0
go.opentelemetry.io/otel/exporters/otlp/otlptracev1.28.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpcv1.27.0
go.opentelemetry.io/otel/metricv1.28.0
go.opentelemetry.io/otel/sdkv1.28.0
go.opentelemetry.io/otel/tracev1.28.0
go.opentelemetry.io/proto/otlpv1.3.1
go.uber.org/multierrv1.11.0
go.uber.org/zapv1.26.0
golang.org/x/cryptov0.24.0
golang.org/x/expv0.0.0-20230515195305-f3d0a9c9a5cc
golang.org/x/netv0.26.0
golang.org/x/oauth2v0.21.0
golang.org/x/syncv0.7.0
golang.org/x/sysv0.21.0
golang.org/x/termv0.21.0
golang.org/x/textv0.16.0
golang.org/x/timev0.3.0
golang.org/x/toolsv0.21.1-0.20240508182429-e35e4ccd0d2d
google.golang.org/genproto/googleapis/apiv0.0.0-20240528184218-531527333157
google.golang.org/genproto/googleapis/rpcv0.0.0-20240701130421-f6361c86f094
google.golang.org/grpcv1.65.0
google.golang.org/protobufv1.34.2
gopkg.in/evanphx/json-patch.v4v4.12.0
gopkg.in/inf.v0v0.9.1
gopkg.in/natefinch/lumberjack.v2v2.2.1
gopkg.in/square/go-jose.v2v2.6.0
gopkg.in/yaml.v2v2.4.0
gopkg.in/yaml.v3v3.0.1
k8s.io/api
k8s.io/apiextensions-apiserver
k8s.io/apimachinery
k8s.io/apiserver
k8s.io/client-go
k8s.io/cloud-provider
k8s.io/cluster-bootstrap
k8s.io/component-base
k8s.io/component-helpers
k8s.io/controller-manager
k8s.io/cri-api
k8s.io/cri-client
k8s.io/csi-translation-lib
k8s.io/dynamic-resource-allocation
k8s.io/endpointslice
k8s.io/klog/v2v2.130.1
k8s.io/kms
k8s.io/kube-aggregator
k8s.io/kube-controller-manager
k8s.io/kube-openapiv0.0.0-20240228011516-70dd3763d340
k8s.io/kube-scheduler
k8s.io/kubectl
k8s.io/kubelet
k8s.io/metrics
k8s.io/mount-utils
k8s.io/pod-security-admission
k8s.io/utilsv0.0.0-20240711033017-18e509b52bc8
sigs.k8s.io/apiserver-network-proxy/konnectivity-clientv0.30.3
sigs.k8s.io/jsonv0.0.0-20221116044647-bc3834ca7abd
sigs.k8s.io/structured-merge-diff/v4v4.4.1
sigs.k8s.io/yamlv1.4.0
+ +
+

usr/local/bin/etcd

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Package + + + + Vulnerability ID + + + + Severity + + + + Installed Version + + + + Fixed Version + + + + Links + + + +
github.com/golang-jwt/jwt/v4CVE-2024-51744LOWv4.4.24.5.1
stdlibCVE-2024-34156HIGHv1.21.121.22.7, 1.23.1
stdlibCVE-2024-34155MEDIUMv1.21.121.22.7, 1.23.1
stdlibCVE-2024-34158MEDIUMv1.21.121.22.7, 1.23.1
+
+

Packages

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ID + + + + Name + + + + Version + + + + SrcName + + + + SrcVersion + + + +
go.etcd.io/etcd/server/v3
stdlibv1.21.12
../api
../client/pkg
../client/v2
../client/v3
../pkg
../raft
github.com/beorn7/perksv1.0.1
github.com/cenkalti/backoff/v4v4.2.1
github.com/cespare/xxhash/v2v2.2.0
github.com/coreos/go-semverv0.3.0
github.com/coreos/go-systemd/v22v22.3.2
github.com/dustin/go-humanizev1.0.0
github.com/go-logr/logrv1.3.0
github.com/go-logr/stdrv1.2.2
github.com/gogo/protobufv1.3.2
github.com/golang-jwt/jwt/v4v4.4.2
github.com/golang/groupcachev0.0.0-20210331224755-41bb18bfe9da
github.com/golang/protobufv1.5.4
github.com/google/btreev1.0.1
github.com/gorilla/websocketv1.4.2
github.com/grpc-ecosystem/go-grpc-middlewarev1.3.0
github.com/grpc-ecosystem/go-grpc-prometheusv1.2.0
github.com/grpc-ecosystem/grpc-gatewayv1.16.0
github.com/grpc-ecosystem/grpc-gateway/v2v2.16.0
github.com/jonboulle/clockworkv0.2.2
github.com/json-iterator/gov1.1.11
github.com/matttproud/golang_protobuf_extensionsv1.0.1
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.1
github.com/prometheus/client_golangv1.11.1
github.com/prometheus/client_modelv0.2.0
github.com/prometheus/commonv0.26.0
github.com/prometheus/procfsv0.6.0
github.com/sirupsen/logrusv1.9.3
github.com/soheilhy/cmuxv0.1.5
github.com/spf13/cobrav1.1.3
github.com/spf13/pflagv1.0.5
github.com/tmc/grpc-websocket-proxyv0.0.0-20201229170055-e5319fda7802
github.com/xiang90/probingv0.0.0-20190116061207-43a291ad63a2
go.etcd.io/bboltv1.3.10
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpcv0.46.0
go.opentelemetry.io/otelv1.20.0
go.opentelemetry.io/otel/exporters/otlp/otlptracev1.20.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpcv1.20.0
go.opentelemetry.io/otel/metricv1.20.0
go.opentelemetry.io/otel/sdkv1.20.0
go.opentelemetry.io/otel/tracev1.20.0
go.opentelemetry.io/proto/otlpv1.0.0
go.uber.org/atomicv1.7.0
go.uber.org/multierrv1.6.0
go.uber.org/zapv1.17.0
golang.org/x/cryptov0.21.0
golang.org/x/netv0.23.0
golang.org/x/sysv0.18.0
golang.org/x/textv0.14.0
golang.org/x/timev0.0.0-20210220033141-f8bda1e9f3ba
google.golang.org/genprotov0.0.0-20230822172742-b8732ec3820d
google.golang.org/genproto/googleapis/apiv0.0.0-20230822172742-b8732ec3820d
google.golang.org/genproto/googleapis/rpcv0.0.0-20230822172742-b8732ec3820d
google.golang.org/grpcv1.59.0
google.golang.org/protobufv1.33.0
gopkg.in/natefinch/lumberjack.v2v2.0.0
gopkg.in/yaml.v2v2.4.0
sigs.k8s.io/yamlv1.2.0
+ +
+

usr/local/bin/etcd-3.5.15

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Package + + + + Vulnerability ID + + + + Severity + + + + Installed Version + + + + Fixed Version + + + + Links + + + +
github.com/golang-jwt/jwt/v4CVE-2024-51744LOWv4.4.24.5.1
stdlibCVE-2024-34156HIGHv1.21.121.22.7, 1.23.1
stdlibCVE-2024-34155MEDIUMv1.21.121.22.7, 1.23.1
stdlibCVE-2024-34158MEDIUMv1.21.121.22.7, 1.23.1
+
+

Packages

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ID + + + + Name + + + + Version + + + + SrcName + + + + SrcVersion + + + +
go.etcd.io/etcd/server/v3
stdlibv1.21.12
../api
../client/pkg
../client/v2
../client/v3
../pkg
../raft
github.com/beorn7/perksv1.0.1
github.com/cenkalti/backoff/v4v4.2.1
github.com/cespare/xxhash/v2v2.2.0
github.com/coreos/go-semverv0.3.0
github.com/coreos/go-systemd/v22v22.3.2
github.com/dustin/go-humanizev1.0.0
github.com/go-logr/logrv1.3.0
github.com/go-logr/stdrv1.2.2
github.com/gogo/protobufv1.3.2
github.com/golang-jwt/jwt/v4v4.4.2
github.com/golang/groupcachev0.0.0-20210331224755-41bb18bfe9da
github.com/golang/protobufv1.5.4
github.com/google/btreev1.0.1
github.com/gorilla/websocketv1.4.2
github.com/grpc-ecosystem/go-grpc-middlewarev1.3.0
github.com/grpc-ecosystem/go-grpc-prometheusv1.2.0
github.com/grpc-ecosystem/grpc-gatewayv1.16.0
github.com/grpc-ecosystem/grpc-gateway/v2v2.16.0
github.com/jonboulle/clockworkv0.2.2
github.com/json-iterator/gov1.1.11
github.com/matttproud/golang_protobuf_extensionsv1.0.1
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.1
github.com/prometheus/client_golangv1.11.1
github.com/prometheus/client_modelv0.2.0
github.com/prometheus/commonv0.26.0
github.com/prometheus/procfsv0.6.0
github.com/sirupsen/logrusv1.9.3
github.com/soheilhy/cmuxv0.1.5
github.com/spf13/cobrav1.1.3
github.com/spf13/pflagv1.0.5
github.com/tmc/grpc-websocket-proxyv0.0.0-20201229170055-e5319fda7802
github.com/xiang90/probingv0.0.0-20190116061207-43a291ad63a2
go.etcd.io/bboltv1.3.10
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpcv0.46.0
go.opentelemetry.io/otelv1.20.0
go.opentelemetry.io/otel/exporters/otlp/otlptracev1.20.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpcv1.20.0
go.opentelemetry.io/otel/metricv1.20.0
go.opentelemetry.io/otel/sdkv1.20.0
go.opentelemetry.io/otel/tracev1.20.0
go.opentelemetry.io/proto/otlpv1.0.0
go.uber.org/atomicv1.7.0
go.uber.org/multierrv1.6.0
go.uber.org/zapv1.17.0
golang.org/x/cryptov0.21.0
golang.org/x/netv0.23.0
golang.org/x/sysv0.18.0
golang.org/x/textv0.14.0
golang.org/x/timev0.0.0-20210220033141-f8bda1e9f3ba
google.golang.org/genprotov0.0.0-20230822172742-b8732ec3820d
google.golang.org/genproto/googleapis/apiv0.0.0-20230822172742-b8732ec3820d
google.golang.org/genproto/googleapis/rpcv0.0.0-20230822172742-b8732ec3820d
google.golang.org/grpcv1.59.0
google.golang.org/protobufv1.33.0
gopkg.in/natefinch/lumberjack.v2v2.0.0
gopkg.in/yaml.v2v2.4.0
sigs.k8s.io/yamlv1.2.0
+ +
+

usr/local/bin/etcdctl

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Package + + + + Vulnerability ID + + + + Severity + + + + Installed Version + + + + Fixed Version + + + + Links + + + +
github.com/golang-jwt/jwt/v4CVE-2024-51744LOWv4.4.24.5.1
stdlibCVE-2024-34156HIGHv1.21.121.22.7, 1.23.1
stdlibCVE-2024-34155MEDIUMv1.21.121.22.7, 1.23.1
stdlibCVE-2024-34158MEDIUMv1.21.121.22.7, 1.23.1
+
+

Packages

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ID + + + + Name + + + + Version + + + + SrcName + + + + SrcVersion + + + +
go.etcd.io/etcd/etcdctl/v3
stdlibv1.21.12
../api
../client/pkg
../client/v2
../client/v3
../etcdutl
../pkg
../raft
../server
github.com/beorn7/perksv1.0.1
github.com/bgentry/speakeasyv0.1.0
github.com/cespare/xxhash/v2v2.2.0
github.com/coreos/go-semverv0.3.0
github.com/coreos/go-systemd/v22v22.3.2
github.com/cpuguy83/go-md2man/v2v2.0.0
github.com/dustin/go-humanizev1.0.0
github.com/go-logr/logrv1.3.0
github.com/go-logr/stdrv1.2.2
github.com/gogo/protobufv1.3.2
github.com/golang-jwt/jwt/v4v4.4.2
github.com/golang/protobufv1.5.4
github.com/google/btreev1.0.1
github.com/jonboulle/clockworkv0.2.2
github.com/json-iterator/gov1.1.11
github.com/mattn/go-runewidthv0.0.9
github.com/matttproud/golang_protobuf_extensionsv1.0.1
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.1
github.com/olekukonko/tablewriterv0.0.5
github.com/prometheus/client_golangv1.11.1
github.com/prometheus/client_modelv0.2.0
github.com/prometheus/commonv0.26.0
github.com/prometheus/procfsv0.6.0
github.com/russross/blackfriday/v2v2.0.1
github.com/shurcooL/sanitized_anchor_namev1.0.0
github.com/spf13/cobrav1.1.3
github.com/spf13/pflagv1.0.5
github.com/urfave/cliv1.22.4
github.com/xiang90/probingv0.0.0-20190116061207-43a291ad63a2
go.etcd.io/bboltv1.3.10
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpcv0.46.0
go.opentelemetry.io/otelv1.20.0
go.opentelemetry.io/otel/metricv1.20.0
go.opentelemetry.io/otel/tracev1.20.0
go.uber.org/atomicv1.7.0
go.uber.org/multierrv1.6.0
go.uber.org/zapv1.17.0
golang.org/x/cryptov0.21.0
golang.org/x/netv0.23.0
golang.org/x/sysv0.18.0
golang.org/x/textv0.14.0
golang.org/x/timev0.0.0-20210220033141-f8bda1e9f3ba
google.golang.org/genproto/googleapis/apiv0.0.0-20230822172742-b8732ec3820d
google.golang.org/genproto/googleapis/rpcv0.0.0-20230822172742-b8732ec3820d
google.golang.org/grpcv1.59.0
google.golang.org/protobufv1.33.0
gopkg.in/cheggaaa/pb.v1v1.0.28
+ +
+

usr/local/bin/etcdctl-3.5.15

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Package + + + + Vulnerability ID + + + + Severity + + + + Installed Version + + + + Fixed Version + + + + Links + + + +
github.com/golang-jwt/jwt/v4CVE-2024-51744LOWv4.4.24.5.1
stdlibCVE-2024-34156HIGHv1.21.121.22.7, 1.23.1
stdlibCVE-2024-34155MEDIUMv1.21.121.22.7, 1.23.1
stdlibCVE-2024-34158MEDIUMv1.21.121.22.7, 1.23.1
+
+

Packages

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ID + + + + Name + + + + Version + + + + SrcName + + + + SrcVersion + + + +
go.etcd.io/etcd/etcdctl/v3
stdlibv1.21.12
../api
../client/pkg
../client/v2
../client/v3
../etcdutl
../pkg
../raft
../server
github.com/beorn7/perksv1.0.1
github.com/bgentry/speakeasyv0.1.0
github.com/cespare/xxhash/v2v2.2.0
github.com/coreos/go-semverv0.3.0
github.com/coreos/go-systemd/v22v22.3.2
github.com/cpuguy83/go-md2man/v2v2.0.0
github.com/dustin/go-humanizev1.0.0
github.com/go-logr/logrv1.3.0
github.com/go-logr/stdrv1.2.2
github.com/gogo/protobufv1.3.2
github.com/golang-jwt/jwt/v4v4.4.2
github.com/golang/protobufv1.5.4
github.com/google/btreev1.0.1
github.com/jonboulle/clockworkv0.2.2
github.com/json-iterator/gov1.1.11
github.com/mattn/go-runewidthv0.0.9
github.com/matttproud/golang_protobuf_extensionsv1.0.1
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.1
github.com/olekukonko/tablewriterv0.0.5
github.com/prometheus/client_golangv1.11.1
github.com/prometheus/client_modelv0.2.0
github.com/prometheus/commonv0.26.0
github.com/prometheus/procfsv0.6.0
github.com/russross/blackfriday/v2v2.0.1
github.com/shurcooL/sanitized_anchor_namev1.0.0
github.com/spf13/cobrav1.1.3
github.com/spf13/pflagv1.0.5
github.com/urfave/cliv1.22.4
github.com/xiang90/probingv0.0.0-20190116061207-43a291ad63a2
go.etcd.io/bboltv1.3.10
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpcv0.46.0
go.opentelemetry.io/otelv1.20.0
go.opentelemetry.io/otel/metricv1.20.0
go.opentelemetry.io/otel/tracev1.20.0
go.uber.org/atomicv1.7.0
go.uber.org/multierrv1.6.0
go.uber.org/zapv1.17.0
golang.org/x/cryptov0.21.0
golang.org/x/netv0.23.0
golang.org/x/sysv0.18.0
golang.org/x/textv0.14.0
golang.org/x/timev0.0.0-20210220033141-f8bda1e9f3ba
google.golang.org/genproto/googleapis/apiv0.0.0-20230822172742-b8732ec3820d
google.golang.org/genproto/googleapis/rpcv0.0.0-20230822172742-b8732ec3820d
google.golang.org/grpcv1.59.0
google.golang.org/protobufv1.33.0
gopkg.in/cheggaaa/pb.v1v1.0.28
+ +
+

usr/local/bin/migrate

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Package + + + + Vulnerability ID + + + + Severity + + + + Installed Version + + + + Fixed Version + + + + Links + + + +
stdlibCVE-2024-34156HIGHv1.21.121.22.7, 1.23.1
stdlibCVE-2024-34155MEDIUMv1.21.121.22.7, 1.23.1
stdlibCVE-2024-34158MEDIUMv1.21.121.22.7, 1.23.1
+
+

Packages

+
+ + + + + + + + + + + + + + + + + + + + + +
ID + + + + Name + + + + Version + + + + SrcName + + + + SrcVersion + + + +
stdlibv1.21.12
+ +
+

docker.io/kindest/local-path-provisioner:v20240813-c6f155d6 (debian 11.10)

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Package + + + + Vulnerability ID + + + + Severity + + + + Installed Version + + + + Fixed Version + + + + Links + + + +
libc6CVE-2023-4806MEDIUM2.31-13+deb11u10
libc6CVE-2023-4813MEDIUM2.31-13+deb11u10
libc6CVE-2010-4756LOW2.31-13+deb11u10
libc6CVE-2018-20796LOW2.31-13+deb11u10
libc6CVE-2019-1010022LOW2.31-13+deb11u10
libc6CVE-2019-1010023LOW2.31-13+deb11u10
libc6CVE-2019-1010024LOW2.31-13+deb11u10
libc6CVE-2019-1010025LOW2.31-13+deb11u10
libc6CVE-2019-9192LOW2.31-13+deb11u10
libssl1.1CVE-2023-5678MEDIUM1.1.1w-0+deb11u11.1.1w-0+deb11u2
libssl1.1CVE-2024-0727MEDIUM1.1.1w-0+deb11u11.1.1w-0+deb11u2
libssl1.1CVE-2024-4741MEDIUM1.1.1w-0+deb11u11.1.1w-0+deb11u2
libssl1.1CVE-2024-5535MEDIUM1.1.1w-0+deb11u11.1.1w-0+deb11u2
libssl1.1CVE-2024-2511LOW1.1.1w-0+deb11u11.1.1w-0+deb11u2
libssl1.1CVE-2024-9143LOW1.1.1w-0+deb11u11.1.1w-0+deb11u2
opensslCVE-2023-5678MEDIUM1.1.1w-0+deb11u11.1.1w-0+deb11u2
opensslCVE-2024-0727MEDIUM1.1.1w-0+deb11u11.1.1w-0+deb11u2
opensslCVE-2024-4741MEDIUM1.1.1w-0+deb11u11.1.1w-0+deb11u2
opensslCVE-2024-5535MEDIUM1.1.1w-0+deb11u11.1.1w-0+deb11u2
opensslCVE-2024-2511LOW1.1.1w-0+deb11u11.1.1w-0+deb11u2
opensslCVE-2024-9143LOW1.1.1w-0+deb11u11.1.1w-0+deb11u2
tzdataDLA-3972-1UNKNOWN2024a-0+deb11u12024b-0+deb11u1
+
+

Packages

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ID + + + + Name + + + + Version + + + + SrcName + + + + SrcVersion + + + +
base-files@11.1+deb11u10base-files11.1+deb11u10base-files11.1+deb11u10
libc6@2.31-13+deb11u10libc62.31glibc2.31
libssl1.1@1.1.1w-0+deb11u1libssl1.11.1.1wopenssl1.1.1w
netbase@6.3netbase6.3netbase6.3
openssl@1.1.1w-0+deb11u1openssl1.1.1wopenssl1.1.1w
tzdata@2024a-0+deb11u1tzdata2024atzdata2024a
+ +
+

usr/local/bin/local-path-provisioner

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Package + + + + Vulnerability ID + + + + Severity + + + + Installed Version + + + + Fixed Version + + + + Links + + + +
github.com/gogo/protobufCVE-2021-3121HIGHv1.3.11.3.2
golang.org/x/cryptoCVE-2023-48795MEDIUMv0.7.00.17.0
golang.org/x/netCVE-2023-39325HIGHv0.8.00.17.0
golang.org/x/netCVE-2023-3978MEDIUMv0.8.00.13.0
golang.org/x/netCVE-2023-44487MEDIUMv0.8.00.17.0
golang.org/x/netCVE-2023-45288MEDIUMv0.8.00.23.0
google.golang.org/protobufCVE-2024-24786MEDIUMv1.30.01.33.0
k8s.io/client-goCVE-2020-8565MEDIUMv0.19.10.19.6, 0.20.0-alpha.2, 0.18.14, 0.17.16
stdlibCVE-2024-34156HIGHv1.22.61.22.7, 1.23.1
stdlibCVE-2024-34155MEDIUMv1.22.61.22.7, 1.23.1
stdlibCVE-2024-34158MEDIUMv1.22.61.22.7, 1.23.1
+
+

Packages

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ID + + + + Name + + + + Version + + + + SrcName + + + + SrcVersion + + + +
github.com/rancher/local-path-provisionerv0.0.24
stdlibv1.22.6
github.com/Sirupsen/logrusv0.11.0
github.com/beorn7/perksv1.0.1
github.com/cespare/xxhash/v2v2.1.2
github.com/davecgh/go-spewv1.1.1
github.com/go-logr/logrv0.2.0
github.com/gogo/protobufv1.3.1
github.com/golang/groupcachev0.0.0-20200121045136-8c9f03a8e57e
github.com/golang/protobufv1.5.3
github.com/google/go-cmpv0.5.8
github.com/google/gofuzzv1.1.0
github.com/google/uuidv1.1.1
github.com/googleapis/gnosticv0.4.1
github.com/hashicorp/golang-lruv0.5.1
github.com/imdario/mergov0.3.5
github.com/json-iterator/gov1.1.12
github.com/matttproud/golang_protobuf_extensionsv1.0.1
github.com/miekg/dnsv1.1.29
github.com/modern-go/concurrentv0.0.0-20180306012644-bacd9c7ef1dd
github.com/modern-go/reflect2v1.0.2
github.com/pkg/errorsv0.9.1
github.com/prometheus/client_golangv1.11.1
github.com/prometheus/client_modelv0.3.0
github.com/prometheus/commonv0.32.1
github.com/prometheus/procfsv0.8.0
github.com/spf13/pflagv1.0.5
github.com/urfave/cliv1.19.1
golang.org/x/cryptov0.7.0
golang.org/x/netv0.8.0
golang.org/x/oauth2v0.6.0
golang.org/x/sysv0.6.0
golang.org/x/termv0.6.0
golang.org/x/textv0.8.0
golang.org/x/timev0.3.0
google.golang.org/protobufv1.30.0
gopkg.in/inf.v0v0.9.1
gopkg.in/yaml.v2v2.4.0
k8s.io/apiv0.19.1
k8s.io/apimachineryv0.19.1
k8s.io/client-gov0.19.1
k8s.io/klog/v2v2.3.0
k8s.io/kube-openapiv0.0.0-20200805222855-6aeccd4b50c6
k8s.io/utilsv0.0.0-20200729134348-d5654de09c73
sigs.k8s.io/sig-storage-lib-external-provisioner/v8v8.0.0
sigs.k8s.io/structured-merge-diff/v4v4.0.1
sigs.k8s.io/yamlv1.2.0
+ + + + + + \ No newline at end of file diff --git a/render/testdata/golden/happy.html b/render/testdata/golden/happy.html index 25e2657..3b5bd9d 100644 --- a/render/testdata/golden/happy.html +++ b/render/testdata/golden/happy.html @@ -4,757 +4,1663 @@ Trivy Report - + + +

Trivy Report - alpine:latest +

+
+ +
+ +
+
+ + +
+ - .vuln { - word-wrap: anywhere; - } + +
+
+
+
+
+
+ +
+ +
+

alpine:latest

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Package + + + + Vulnerability ID + + + + Severity + + + + Installed Version + + + + Fixed Version + + + + Links + + + +
libcrypto3CVE-2024-9143LOW3.3.2-r03.3.2-r1
libssl3CVE-2024-9143LOW3.3.2-r03.3.2-r1
+
+

Packages

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ID + + + + Name + + + + Version + + + + SrcName + + + + SrcVersion + + + +
libfreetype6@2.13.2+dfsg-1build3libfreetype62.13.2+dfsgfreetype2.13.2+dfsg
libgcc-s1@14-20240412-0ubuntu1libgcc-s114-20240412gcc-1414-20240412
- .group-header th { - font-size: 200%; - } +
+

alpine:latest

+
+
+ + + + + + + - table, - th, - td { - border-bottom: 1px solid #0000001f; - border-collapse: collapse; - padding: .3em; - white-space: normal; - } + - table { - margin: 0 auto; - table-layout: fixed; - width: 100%; - border: 1px solid #ddd; - } + + + + + + + + + + + + + + + + + + + + + + + + + +
Type + + + + Misconf ID + + + + Check + + + + Severity + + + + Message + + + +
Dockerfile Security Check DS001':latest' tag usedMEDIUMSpecify a tag in the 'FROM' statement for image 'ansibleplaybookbundle/apb-base' +
+ https://avd.aquasec.com/misconfig/ds001 +
+
Dockerfile Security Check DS011COPY with more than two arguments not ending with slashCRITICALSlash is expected at the end of COPY command argument '}}' +
+ https://avd.aquasec.com/misconfig/ds011 +
+
Dockerfile Security Check DS026No HEALTHCHECK definedLOWAdd HEALTHCHECK instruction in your Dockerfile +
+ https://avd.aquasec.com/misconfig/ds026 +
+
- .severity { - font-weight: bold; - } +
+
+ +
+ + +
+
+
+
+
- table tr td:first-of-type { - font-weight: bold; - } +
+

/etc/ssl/private/ssl-cert-snakeoil.key

+
+
+

+ /etc/ssl/private/ssl-cert-snakeoil.key + (secret) +

- .links a, - .links[data-more-links=on] a { - display: block; - } +
+
+
+ HIGH + AsymmetricPrivateKey (private-key) +
+
Asymmetric Private Key
+
+ /etc/ssl/private/ssl-cert-snakeoil.key + : + + + 1 + +
+
+
+
1
+
+
 -----BEGIN PRIVATE KEY-----*******************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************-----END PRIVATE KEY
+
+
+
+
2
+
+
  
+
+
+
+
+
+
+ + + + + + - - - - -
-

Trivy Report - alpine:latest -

-
- -
-
-

alpine:latest

-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Package - - - - Vulnerability ID - - - - Severity - - - - Installed Version - - - - Fixed Version - - - - Links - - - -
libcrypto3CVE-2024-9143LOW3.3.2-r03.3.2-r1
libssl3CVE-2024-9143LOW3.3.2-r03.3.2-r1
-
-

Packages

-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ID - - - - Name - - - - Version - - - - SrcName - - - - SrcVersion - - - -
libfreetype6@2.13.2+dfsg-1build3libfreetype62.13.2+dfsgfreetype2.13.2+dfsg
libgcc-s1@14-20240412-0ubuntu1libgcc-s114-20240412gcc-1414-20240412
-
-

alpine:latest

-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Type - - - - Misconf ID - - - - Check - - - - Severity - - - - Message - - - -
Dockerfile Security CheckDS001':latest' tag usedMEDIUMSpecify a tag in the 'FROM' statement for image 'ansibleplaybookbundle/apb-base' -
- https://avd.aquasec.com/misconfig/ds001 -
-
Dockerfile Security CheckDS011COPY with more than two arguments not ending with slashCRITICALSlash is expected at the end of COPY command argument '}}' -
- https://avd.aquasec.com/misconfig/ds011 -
-
Dockerfile Security CheckDS026No HEALTHCHECK definedLOWAdd HEALTHCHECK instruction in your Dockerfile -
- https://avd.aquasec.com/misconfig/ds026 -
-
-
-

/etc/ssl/private/ssl-cert-snakeoil.key

-
-
-

- /etc/ssl/private/ssl-cert-snakeoil.key - (secret) -

- -
-
-
- HIGH - AsymmetricPrivateKey (private-key) -
-
Asymmetric Private Key
-
- /etc/ssl/private/ssl-cert-snakeoil.key - : - - - 1 - -
-
-
-
1
-
-
 -----BEGIN PRIVATE KEY-----*******************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************************-----END PRIVATE KEY
-
-
-
-
2
-
-
  
-
-
-
-
-
-
-
+ insertAfter(thead, tbody); + }; + tables.forEach((table, tableIx) => { + table.addEventListener("click", (e) => { + e.stopPropagation(); + const el = e.target; + const type = el.getAttribute("data-type"); + const sortable = el.getAttribute("data-sortable") === "true"; + if (el.nodeName !== "TH" || !sortable) return; + const cellIndex = el.cellIndex; + sortTable(tableIx, cellIndex, type, colIx === cellIndex); + colIx = colIx === cellIndex ? -1 : cellIndex; + }); + }); +} + +document.addEventListener("DOMContentLoaded", () => { + attachLinksInteractivity(); + attachSortInteractivity(); + attachFilterInteractivity(); +}); + \ No newline at end of file diff --git a/render/testdata/input/graph.json b/render/testdata/input/graph.json new file mode 100644 index 0000000..9aa1819 --- /dev/null +++ b/render/testdata/input/graph.json @@ -0,0 +1,999 @@ +{ + "SchemaVersion": 2, + "CreatedAt": "2024-12-09T11:32:53.658007878+06:00", + "ArtifactName": "examples", + "ArtifactType": "filesystem", + "Metadata": { + "ImageConfig": { + "architecture": "", + "created": "0001-01-01T00:00:00Z", + "os": "", + "rootfs": { + "type": "", + "diff_ids": null + }, + "config": {} + } + }, + "Results": [ + { + "Target": "log-storage", + "Class": "config", + "Type": "terraform", + "MisconfSummary": { + "Successes": 38, + "Failures": 0 + } + }, + { + "Target": "log-storage/modules/foo/modules/bar/modules/baz/main.tf", + "Class": "config", + "Type": "terraform", + "MisconfSummary": { + "Successes": 0, + "Failures": 9 + }, + "Misconfigurations": [ + { + "Type": "Terraform Security Check", + "ID": "AVD-AWS-0086", + "AVDID": "AVD-AWS-0086", + "Title": "S3 Access block should block public ACL", + "Description": "S3 buckets should block public ACLs on buckets and any objects they contain. By blocking, PUTs with fail if the object has any public ACL a.\n", + "Message": "No public access block so not blocking public acls", + "Namespace": "builtin.aws.s3.aws0086", + "Query": "data.builtin.aws.s3.aws0086.deny", + "Resolution": "Enable blocking any PUT calls with a public ACL specified", + "Severity": "HIGH", + "PrimaryURL": "https://avd.aquasec.com/misconfig/avd-aws-0086", + "References": [ + "https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html", + "https://avd.aquasec.com/misconfig/avd-aws-0086" + ], + "Status": "FAIL", + "Layer": {}, + "CauseMetadata": { + "Resource": "module.foo", + "Provider": "AWS", + "Service": "s3", + "StartLine": 1, + "EndLine": 3, + "Code": { + "Lines": [ + { + "Number": 1, + "Content": "resource \"aws_s3_bucket\" \"test\" {", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[38;5;33mresource\u001b[0m \u001b[38;5;37m\"aws_s3_bucket\"\u001b[0m \u001b[38;5;37m\"test\"\u001b[0m {", + "FirstCause": true, + "LastCause": false + }, + { + "Number": 2, + "Content": " bucket = \"test\"", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": " \u001b[38;5;245mbucket\u001b[0m = \u001b[38;5;37m\"test\"", + "FirstCause": false, + "LastCause": false + }, + { + "Number": 3, + "Content": "}", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[0m}", + "FirstCause": false, + "LastCause": true + } + ] + }, + "Occurrences": [ + { + "Resource": "module.baz", + "Filename": "log-storage/modules/foo/modules/bar/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.bar", + "Filename": "log-storage/modules/foo/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.foo", + "Filename": "log-storage/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + } + ] + } + }, + { + "Type": "Terraform Security Check", + "ID": "AVD-AWS-0087", + "AVDID": "AVD-AWS-0087", + "Title": "S3 Access block should block public policy", + "Description": "S3 bucket policy should have block public policy to prevent users from putting a policy that enable public access.\n", + "Message": "No public access block so not blocking public policies", + "Namespace": "builtin.aws.s3.aws0087", + "Query": "data.builtin.aws.s3.aws0087.deny", + "Resolution": "Prevent policies that allow public access being PUT", + "Severity": "HIGH", + "PrimaryURL": "https://avd.aquasec.com/misconfig/avd-aws-0087", + "References": [ + "https://docs.aws.amazon.com/AmazonS3/latest/dev-retired/access-control-block-public-access.html", + "https://avd.aquasec.com/misconfig/avd-aws-0087" + ], + "Status": "FAIL", + "Layer": {}, + "CauseMetadata": { + "Resource": "module.foo", + "Provider": "AWS", + "Service": "s3", + "StartLine": 1, + "EndLine": 3, + "Code": { + "Lines": [ + { + "Number": 1, + "Content": "resource \"aws_s3_bucket\" \"test\" {", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[38;5;33mresource\u001b[0m \u001b[38;5;37m\"aws_s3_bucket\"\u001b[0m \u001b[38;5;37m\"test\"\u001b[0m {", + "FirstCause": true, + "LastCause": false + }, + { + "Number": 2, + "Content": " bucket = \"test\"", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": " \u001b[38;5;245mbucket\u001b[0m = \u001b[38;5;37m\"test\"", + "FirstCause": false, + "LastCause": false + }, + { + "Number": 3, + "Content": "}", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[0m}", + "FirstCause": false, + "LastCause": true + } + ] + }, + "Occurrences": [ + { + "Resource": "module.baz", + "Filename": "log-storage/modules/foo/modules/bar/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.bar", + "Filename": "log-storage/modules/foo/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.foo", + "Filename": "log-storage/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + } + ] + } + }, + { + "Type": "Terraform Security Check", + "ID": "AVD-AWS-0088", + "AVDID": "AVD-AWS-0088", + "Title": "Unencrypted S3 bucket.", + "Description": "S3 Buckets should be encrypted to protect the data that is stored within them if access is compromised.\n", + "Message": "Bucket does not have encryption enabled", + "Namespace": "builtin.aws.s3.aws0088", + "Query": "data.builtin.aws.s3.aws0088.deny", + "Resolution": "Configure bucket encryption", + "Severity": "HIGH", + "PrimaryURL": "https://avd.aquasec.com/misconfig/avd-aws-0088", + "References": [ + "https://docs.aws.amazon.com/AmazonS3/latest/userguide/bucket-encryption.html", + "https://avd.aquasec.com/misconfig/avd-aws-0088" + ], + "Status": "FAIL", + "Layer": {}, + "CauseMetadata": { + "Resource": "module.foo", + "Provider": "AWS", + "Service": "s3", + "StartLine": 1, + "EndLine": 3, + "Code": { + "Lines": [ + { + "Number": 1, + "Content": "resource \"aws_s3_bucket\" \"test\" {", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[38;5;33mresource\u001b[0m \u001b[38;5;37m\"aws_s3_bucket\"\u001b[0m \u001b[38;5;37m\"test\"\u001b[0m {", + "FirstCause": true, + "LastCause": false + }, + { + "Number": 2, + "Content": " bucket = \"test\"", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": " \u001b[38;5;245mbucket\u001b[0m = \u001b[38;5;37m\"test\"", + "FirstCause": false, + "LastCause": false + }, + { + "Number": 3, + "Content": "}", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[0m}", + "FirstCause": false, + "LastCause": true + } + ] + }, + "Occurrences": [ + { + "Resource": "module.baz", + "Filename": "log-storage/modules/foo/modules/bar/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.bar", + "Filename": "log-storage/modules/foo/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.foo", + "Filename": "log-storage/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + } + ] + } + }, + { + "Type": "Terraform Security Check", + "ID": "s3-bucket-logging", + "AVDID": "AVD-AWS-0089", + "Title": "S3 Bucket Logging", + "Description": "Ensures S3 bucket logging is enabled for S3 buckets", + "Message": "Bucket has logging disabled", + "Namespace": "builtin.aws.s3.aws0089", + "Query": "data.builtin.aws.s3.aws0089.deny", + "Resolution": "Add a logging block to the resource to enable access logging", + "Severity": "LOW", + "PrimaryURL": "https://avd.aquasec.com/misconfig/s3-bucket-logging", + "References": [ + "https://docs.aws.amazon.com/AmazonS3/latest/userguide/ServerLogs.html", + "https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html", + "https://avd.aquasec.com/misconfig/s3-bucket-logging" + ], + "Status": "FAIL", + "Layer": {}, + "CauseMetadata": { + "Resource": "module.foo", + "Provider": "AWS", + "Service": "s3", + "StartLine": 1, + "EndLine": 3, + "Code": { + "Lines": [ + { + "Number": 1, + "Content": "resource \"aws_s3_bucket\" \"test\" {", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[38;5;33mresource\u001b[0m \u001b[38;5;37m\"aws_s3_bucket\"\u001b[0m \u001b[38;5;37m\"test\"\u001b[0m {", + "FirstCause": true, + "LastCause": false + }, + { + "Number": 2, + "Content": " bucket = \"test\"", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": " \u001b[38;5;245mbucket\u001b[0m = \u001b[38;5;37m\"test\"", + "FirstCause": false, + "LastCause": false + }, + { + "Number": 3, + "Content": "}", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[0m}", + "FirstCause": false, + "LastCause": true + } + ] + }, + "Occurrences": [ + { + "Resource": "module.baz", + "Filename": "log-storage/modules/foo/modules/bar/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.bar", + "Filename": "log-storage/modules/foo/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.foo", + "Filename": "log-storage/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + } + ] + } + }, + { + "Type": "Terraform Security Check", + "ID": "AVD-AWS-0090", + "AVDID": "AVD-AWS-0090", + "Title": "S3 Data should be versioned", + "Description": "Versioning in Amazon S3 is a means of keeping multiple variants of an object in the same bucket.\n\nYou can use the S3 Versioning feature to preserve, retrieve, and restore every version of every object stored in your buckets.\n\nWith versioning you can recover more easily from both unintended user actions and application failures.\n", + "Message": "Bucket does not have versioning enabled", + "Namespace": "builtin.aws.s3.aws0090", + "Query": "data.builtin.aws.s3.aws0090.deny", + "Resolution": "Enable versioning to protect against accidental/malicious removal or modification", + "Severity": "MEDIUM", + "PrimaryURL": "https://avd.aquasec.com/misconfig/avd-aws-0090", + "References": [ + "https://docs.aws.amazon.com/AmazonS3/latest/userguide/Versioning.html", + "https://avd.aquasec.com/misconfig/avd-aws-0090" + ], + "Status": "FAIL", + "Layer": {}, + "CauseMetadata": { + "Resource": "module.foo", + "Provider": "AWS", + "Service": "s3", + "StartLine": 1, + "EndLine": 3, + "Code": { + "Lines": [ + { + "Number": 1, + "Content": "resource \"aws_s3_bucket\" \"test\" {", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[38;5;33mresource\u001b[0m \u001b[38;5;37m\"aws_s3_bucket\"\u001b[0m \u001b[38;5;37m\"test\"\u001b[0m {", + "FirstCause": true, + "LastCause": false + }, + { + "Number": 2, + "Content": " bucket = \"test\"", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": " \u001b[38;5;245mbucket\u001b[0m = \u001b[38;5;37m\"test\"", + "FirstCause": false, + "LastCause": false + }, + { + "Number": 3, + "Content": "}", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[0m}", + "FirstCause": false, + "LastCause": true + } + ] + }, + "Occurrences": [ + { + "Resource": "module.baz", + "Filename": "log-storage/modules/foo/modules/bar/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.bar", + "Filename": "log-storage/modules/foo/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.foo", + "Filename": "log-storage/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + } + ] + } + }, + { + "Type": "Terraform Security Check", + "ID": "AVD-AWS-0091", + "AVDID": "AVD-AWS-0091", + "Title": "S3 Access Block should Ignore Public Acl", + "Description": "S3 buckets should ignore public ACLs on buckets and any objects they contain. By ignoring rather than blocking, PUT calls with public ACLs will still be applied but the ACL will be ignored.\n", + "Message": "No public access block so not blocking public acls", + "Namespace": "builtin.aws.s3.aws0091", + "Query": "data.builtin.aws.s3.aws0091.deny", + "Resolution": "Enable ignoring the application of public ACLs in PUT calls", + "Severity": "HIGH", + "PrimaryURL": "https://avd.aquasec.com/misconfig/avd-aws-0091", + "References": [ + "https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html", + "https://avd.aquasec.com/misconfig/avd-aws-0091" + ], + "Status": "FAIL", + "Layer": {}, + "CauseMetadata": { + "Resource": "module.foo", + "Provider": "AWS", + "Service": "s3", + "StartLine": 1, + "EndLine": 3, + "Code": { + "Lines": [ + { + "Number": 1, + "Content": "resource \"aws_s3_bucket\" \"test\" {", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[38;5;33mresource\u001b[0m \u001b[38;5;37m\"aws_s3_bucket\"\u001b[0m \u001b[38;5;37m\"test\"\u001b[0m {", + "FirstCause": true, + "LastCause": false + }, + { + "Number": 2, + "Content": " bucket = \"test\"", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": " \u001b[38;5;245mbucket\u001b[0m = \u001b[38;5;37m\"test\"", + "FirstCause": false, + "LastCause": false + }, + { + "Number": 3, + "Content": "}", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[0m}", + "FirstCause": false, + "LastCause": true + } + ] + }, + "Occurrences": [ + { + "Resource": "module.baz", + "Filename": "log-storage/modules/foo/modules/bar/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.bar", + "Filename": "log-storage/modules/foo/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.foo", + "Filename": "log-storage/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + } + ] + } + }, + { + "Type": "Terraform Security Check", + "ID": "AVD-AWS-0093", + "AVDID": "AVD-AWS-0093", + "Title": "S3 Access block should restrict public bucket to limit access", + "Description": "S3 buckets should restrict public policies for the bucket. By enabling, the restrict_public_buckets, only the bucket owner and AWS Services can access if it has a public policy.\n", + "Message": "No public access block so not restricting public buckets", + "Namespace": "builtin.aws.s3.aws0093", + "Query": "data.builtin.aws.s3.aws0093.deny", + "Resolution": "Limit the access to public buckets to only the owner or AWS Services (eg; CloudFront)", + "Severity": "HIGH", + "PrimaryURL": "https://avd.aquasec.com/misconfig/avd-aws-0093", + "References": [ + "https://docs.aws.amazon.com/AmazonS3/latest/dev-retired/access-control-block-public-access.html", + "https://avd.aquasec.com/misconfig/avd-aws-0093" + ], + "Status": "FAIL", + "Layer": {}, + "CauseMetadata": { + "Resource": "module.foo", + "Provider": "AWS", + "Service": "s3", + "StartLine": 1, + "EndLine": 3, + "Code": { + "Lines": [ + { + "Number": 1, + "Content": "resource \"aws_s3_bucket\" \"test\" {", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[38;5;33mresource\u001b[0m \u001b[38;5;37m\"aws_s3_bucket\"\u001b[0m \u001b[38;5;37m\"test\"\u001b[0m {", + "FirstCause": true, + "LastCause": false + }, + { + "Number": 2, + "Content": " bucket = \"test\"", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": " \u001b[38;5;245mbucket\u001b[0m = \u001b[38;5;37m\"test\"", + "FirstCause": false, + "LastCause": false + }, + { + "Number": 3, + "Content": "}", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[0m}", + "FirstCause": false, + "LastCause": true + } + ] + }, + "Occurrences": [ + { + "Resource": "module.baz", + "Filename": "log-storage/modules/foo/modules/bar/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.bar", + "Filename": "log-storage/modules/foo/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.foo", + "Filename": "log-storage/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + } + ] + } + }, + { + "Type": "Terraform Security Check", + "ID": "AVD-AWS-0094", + "AVDID": "AVD-AWS-0094", + "Title": "S3 buckets should each define an aws_s3_bucket_public_access_block", + "Description": "The \"block public access\" settings in S3 override individual policies that apply to a given bucket, meaning that all public access can be controlled in one central types for that bucket. It is therefore good practice to define these settings for each bucket in order to clearly define the public access that can be allowed for it.\n", + "Message": "Bucket does not have a corresponding public access block.", + "Namespace": "builtin.aws.s3.aws0094", + "Query": "data.builtin.aws.s3.aws0094.deny", + "Resolution": "Define a aws_s3_bucket_public_access_block for the given bucket to control public access policies", + "Severity": "LOW", + "PrimaryURL": "https://avd.aquasec.com/misconfig/avd-aws-0094", + "References": [ + "https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html", + "https://avd.aquasec.com/misconfig/avd-aws-0094" + ], + "Status": "FAIL", + "Layer": {}, + "CauseMetadata": { + "Resource": "module.foo", + "Provider": "AWS", + "Service": "s3", + "StartLine": 1, + "EndLine": 3, + "Code": { + "Lines": [ + { + "Number": 1, + "Content": "resource \"aws_s3_bucket\" \"test\" {", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[38;5;33mresource\u001b[0m \u001b[38;5;37m\"aws_s3_bucket\"\u001b[0m \u001b[38;5;37m\"test\"\u001b[0m {", + "FirstCause": true, + "LastCause": false + }, + { + "Number": 2, + "Content": " bucket = \"test\"", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": " \u001b[38;5;245mbucket\u001b[0m = \u001b[38;5;37m\"test\"", + "FirstCause": false, + "LastCause": false + }, + { + "Number": 3, + "Content": "}", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[0m}", + "FirstCause": false, + "LastCause": true + } + ] + }, + "Occurrences": [ + { + "Resource": "module.baz", + "Filename": "log-storage/modules/foo/modules/bar/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.bar", + "Filename": "log-storage/modules/foo/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.foo", + "Filename": "log-storage/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + } + ] + } + }, + { + "Type": "Terraform Security Check", + "ID": "AVD-AWS-0132", + "AVDID": "AVD-AWS-0132", + "Title": "S3 encryption should use Customer Managed Keys", + "Description": "Encryption using AWS keys provides protection for your S3 buckets. To increase control of the encryption and manage factors like rotation use customer managed keys.\n", + "Message": "Bucket does not encrypt data with a customer managed key.", + "Namespace": "builtin.aws.s3.aws0132", + "Query": "data.builtin.aws.s3.aws0132.deny", + "Resolution": "Enable encryption using customer managed keys", + "Severity": "HIGH", + "PrimaryURL": "https://avd.aquasec.com/misconfig/avd-aws-0132", + "References": [ + "https://docs.aws.amazon.com/AmazonS3/latest/userguide/bucket-encryption.html", + "https://avd.aquasec.com/misconfig/avd-aws-0132" + ], + "Status": "FAIL", + "Layer": {}, + "CauseMetadata": { + "Resource": "module.foo", + "Provider": "AWS", + "Service": "s3", + "StartLine": 1, + "EndLine": 3, + "Code": { + "Lines": [ + { + "Number": 1, + "Content": "resource \"aws_s3_bucket\" \"test\" {", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[38;5;33mresource\u001b[0m \u001b[38;5;37m\"aws_s3_bucket\"\u001b[0m \u001b[38;5;37m\"test\"\u001b[0m {", + "FirstCause": true, + "LastCause": false + }, + { + "Number": 2, + "Content": " bucket = \"test\"", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": " \u001b[38;5;245mbucket\u001b[0m = \u001b[38;5;37m\"test\"", + "FirstCause": false, + "LastCause": false + }, + { + "Number": 3, + "Content": "}", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[0m}", + "FirstCause": false, + "LastCause": true + } + ] + }, + "Occurrences": [ + { + "Resource": "module.baz", + "Filename": "log-storage/modules/foo/modules/bar/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.bar", + "Filename": "log-storage/modules/foo/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.foo", + "Filename": "log-storage/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + } + ] + } + } + + ] + }, + { + "Target": "log-storage/modules/foo/modules/bar/modules/baz/main.tf", + "Class": "config", + "Type": "terraform", + "MisconfSummary": { + "Successes": 0, + "Failures": 9 + }, + "Misconfigurations": [ + { + "Type": "Terraform Security Check", + "ID": "AVD-AWS-0086", + "AVDID": "AVD-AWS-0086", + "Title": "S3 Access block should block public ACL", + "Description": "S3 buckets should block public ACLs on buckets and any objects they contain. By blocking, PUTs with fail if the object has any public ACL a.\n", + "Message": "No public access block so not blocking public acls", + "Namespace": "builtin.aws.s3.aws0086", + "Query": "data.builtin.aws.s3.aws0086.deny", + "Resolution": "Enable blocking any PUT calls with a public ACL specified", + "Severity": "HIGH", + "PrimaryURL": "https://avd.aquasec.com/misconfig/avd-aws-0086", + "References": [ + "https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html", + "https://avd.aquasec.com/misconfig/avd-aws-0086" + ], + "Status": "FAIL", + "Layer": {}, + "CauseMetadata": { + "Resource": "module.foo", + "Provider": "AWS", + "Service": "s3", + "StartLine": 1, + "EndLine": 3, + "Code": { + "Lines": [ + { + "Number": 1, + "Content": "resource \"aws_s3_bucket\" \"test\" {", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[38;5;33mresource\u001b[0m \u001b[38;5;37m\"aws_s3_bucket\"\u001b[0m \u001b[38;5;37m\"test\"\u001b[0m {", + "FirstCause": true, + "LastCause": false + }, + { + "Number": 2, + "Content": " bucket = \"test\"", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": " \u001b[38;5;245mbucket\u001b[0m = \u001b[38;5;37m\"test\"", + "FirstCause": false, + "LastCause": false + }, + { + "Number": 3, + "Content": "}", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[0m}", + "FirstCause": false, + "LastCause": true + } + ] + }, + "Occurrences": [ + { + "Resource": "module.baz", + "Filename": "log-storage/modules/foo/modules/bar/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.bar", + "Filename": "log-storage/modules/foo/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.foo", + "Filename": "log-storage/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + } + ] + } + }, + { + "Type": "Terraform Security Check", + "ID": "AVD-AWS-0086", + "AVDID": "AVD-AWS-0086", + "Title": "S3 Access block should block public ACL", + "Description": "S3 buckets should block public ACLs on buckets and any objects they contain. By blocking, PUTs with fail if the object has any public ACL a.\n", + "Message": "No public access block so not blocking public acls", + "Namespace": "builtin.aws.s3.aws0086", + "Query": "data.builtin.aws.s3.aws0086.deny", + "Resolution": "Enable blocking any PUT calls with a public ACL specified", + "Severity": "HIGH", + "PrimaryURL": "https://avd.aquasec.com/misconfig/avd-aws-0086", + "References": [ + "https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html", + "https://avd.aquasec.com/misconfig/avd-aws-0086" + ], + "Status": "FAIL", + "Layer": {}, + "CauseMetadata": { + "Resource": "module.foo", + "Provider": "AWS", + "Service": "s3", + "StartLine": 1, + "EndLine": 3, + "Code": { + "Lines": [ + { + "Number": 1, + "Content": "resource \"aws_s3_bucket\" \"test\" {", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[38;5;33mresource\u001b[0m \u001b[38;5;37m\"aws_s3_bucket\"\u001b[0m \u001b[38;5;37m\"test\"\u001b[0m {", + "FirstCause": true, + "LastCause": false + }, + { + "Number": 2, + "Content": " bucket = \"test\"", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": " \u001b[38;5;245mbucket\u001b[0m = \u001b[38;5;37m\"test\"", + "FirstCause": false, + "LastCause": false + }, + { + "Number": 3, + "Content": "}", + "IsCause": true, + "Annotation": "", + "Truncated": false, + "Highlighted": "\u001b[0m}", + "FirstCause": false, + "LastCause": true + } + ] + }, + "Occurrences": [ + { + "Resource": "module.baz", + "Filename": "log-storage/modules/foo/modules/bar/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.bar", + "Filename": "log-storage/modules/foo/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + }, + { + "Resource": "module.foo", + "Filename": "log-storage/main.tf", + "Location": { + "StartLine": 1, + "EndLine": 3 + } + } + ] + } + } + ] + } + ] +}