🎄 Join our Annual Holiday wargame and win prizes!


Seccomp Disabled

Seccomp, or Secure Computing Mode, is a Linux kernel feature that enhances security by restricting the system calls available to a process. It allows fine-grained control over the system calls a process can make, reducing its attack surface. When enabled in a Kubernetes environment, Seccomp can significantly enhance container security by limiting the system calls that containers are allowed to execute. This prevents applications or processes from making potentially risky or unnecessary system calls, reducing the risk of exploitation by malicious actors.

Remediation

The following example enforces `RuntimeDefault` seccomp profile on `app` container.

apiVersion: apps/v1
kind: Deployment
spec:
  template:
    spec:
      securityContext:
        seccompProfile:
          type: RuntimeDefault
      containers:
      - name: app

Metadata

  • Severity: low
  • Slug: seccomp-disabled

CWEs

  • 272: Least Privilege Violation
  • 269: Improper Privilege Management

OWASP

  • A04:2021: Insecure Design

Available Labs

Select a language to explore available labs for this vulnerability.

No matching labs found

Try adjusting your language filter.

Deco line
Deco line

Play AppSec WarGames

Want to skill-up in secure coding and AppSec? Try SecDim Wargames to learn how to find, hack and fix security vulnerabilities inspired by real-world incidents.

Deco line
Deco line

Got a comment?

Join our secure coding and AppSec community. A discussion board to share and discuss all aspects of secure programming, AppSec, DevSecOps, fuzzing, cloudsec, AIsec code review, and more.

Read more