Container Labs
Explore 1 lab in Container.
When a container image that is externally sourced is not pinned to their SHA hash, malicious modification of the image can go undetected. For example, an adversary can modify the image with backdoor and the backdoor gets executed as there is no integrity check of the container image.
Use SHA hash to pin to the desired version of the container image. This is the only way to always reference the immutability version of the image.
Select a language to explore available labs for this vulnerability.
Try adjusting your language filter.
Want to skill-up in secure coding and AppSec? Try SecDim Wargames to learn how to find, hack and fix security vulnerabilities inspired by real-world incidents.
Join our secure coding and AppSec community. A discussion board to share and discuss all aspects of secure programming, AppSec, DevSecOps, fuzzing, cloudsec, AIsec code review, and more.
Read more