-
Notifications
You must be signed in to change notification settings - Fork 988
Open
Labels
sig/contributor-experienceCategorizes an issue or PR as relevant to SIG Contributor Experience.Categorizes an issue or PR as relevant to SIG Contributor Experience.sig/k8s-infraCategorizes an issue or PR as relevant to SIG K8s Infra.Categorizes an issue or PR as relevant to SIG K8s Infra.
Description
Severity: High
Files Affected: Multiple deployment YAMLs in apps/slack-infra/
Impact: Known security vulnerabilities, missing security patches
Issue:
Critical applications are running images from 2021-2023 without updates:
# apps/slack-infra/resources/slack-moderator/deployment.yaml:19
image: gcr.io/k8s-staging-slack-infra/slack-moderator:v20210223-8525eb3
# apps/slack-infra/resources/slack-event-log/deployment.yaml:19
image: gcr.io/k8s-staging-slack-infra/slack-event-log:v20210223-8525eb3Security Analysis:
- Images are 3-5 years old (as of Jan 2026)
- Likely contain critical CVEs in base images and dependencies
- No automated image scanning or update process evident
- No SBOMs or vulnerability tracking
Known Risk Categories:
- Base OS vulnerabilities (if using Alpine/Ubuntu/Debian from 2021)
- Outdated Go/Node.js runtime vulnerabilities
- Unpatched OpenSSL/glibc vulnerabilities
- Missing security backports
Recommendation:
- Immediate: Security scan all images with Trivy/Grype
- Deploy: Automated image rebuild pipeline (monthly at minimum)
- Implement: Image admission controller (e.g., Kyverno) to block old images
- Create: SLA for security patch deployment (critical: 7 days, high: 30 days)
- Enable: Runtime security monitoring (Falco, Tetragon)
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
sig/contributor-experienceCategorizes an issue or PR as relevant to SIG Contributor Experience.Categorizes an issue or PR as relevant to SIG Contributor Experience.sig/k8s-infraCategorizes an issue or PR as relevant to SIG K8s Infra.Categorizes an issue or PR as relevant to SIG K8s Infra.