Skip to content

formatting

formatting #196

Triggered via push November 22, 2024 15:22
Status Success
Total duration 1m 24s
Artifacts
scan_helm  /  Kics Helm Chart Scan
24s
scan_helm / Kics Helm Chart Scan
Fit to window
Zoom out
Zoom in

Annotations

10 warnings
[MEDIUM] CPU Limits Not Set: charts/schulportal-load-tests/templates/cronjob.yaml#L58
CPU limits should be set because if the system has CPU time free, a container is guaranteed to be allocated as much CPU as it requests
[MEDIUM] CPU Limits Not Set: charts/schulportal-load-tests/templates/cronjob.yaml#L58
CPU limits should be set because if the system has CPU time free, a container is guaranteed to be allocated as much CPU as it requests
[MEDIUM] CPU Limits Not Set: charts/schulportal-load-tests/templates/cronjob.yaml#L58
CPU limits should be set because if the system has CPU time free, a container is guaranteed to be allocated as much CPU as it requests
[MEDIUM] CPU Requests Not Set: charts/schulportal-load-tests/templates/cronjob.yaml#L58
CPU requests should be set to ensure the sum of the resource requests of the scheduled Containers is less than the capacity of the node
[MEDIUM] CPU Requests Not Set: charts/schulportal-load-tests/templates/cronjob.yaml#L58
CPU requests should be set to ensure the sum of the resource requests of the scheduled Containers is less than the capacity of the node
[MEDIUM] CPU Requests Not Set: charts/schulportal-load-tests/templates/cronjob.yaml#L58
CPU requests should be set to ensure the sum of the resource requests of the scheduled Containers is less than the capacity of the node
[MEDIUM] Container Running As Root: charts/schulportal-load-tests/templates/cronjob.yaml#L58
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
[MEDIUM] Container Running As Root: charts/schulportal-load-tests/templates/cronjob.yaml#L58
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
[MEDIUM] Container Running As Root: charts/schulportal-load-tests/templates/cronjob.yaml#L58
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
[MEDIUM] Container Running With Low UID: charts/schulportal-load-tests/templates/cronjob.yaml#L58
Check if containers are running with low UID, which might cause conflicts with the host's user table.