gitops-pipeline-developer
Warn
Audited by Socket on Apr 28, 2026
1 alert found:
AnomalyAnomalyassets/shared-library/resources/pod-template.yaml
LOWAnomalyLOW
assets/shared-library/resources/pod-template.yaml
No explicit malicious payload is evident in the provided Pod manifest alone; however, it sets up a CI build environment with materially increased attack surface and blast radius: a BuildKit daemon listens on tcp://0.0.0.0:1234 and runs with weakened isolation (Unconfined seccomp and no-process-sandbox). The tools container mounts multiple high-value secrets (registry credentials, SSH key, Vault token, optional Slack webhook) for long-lived use. Malicious behavior (e.g., credential harvesting or webhook exfiltration) would most likely occur in the omitted runtime scripts/pipeline steps, so those components require review to confirm safe handling and restricted build access.
Confidence: 60%Severity: 68%
Audit Metadata