The MITRE SAF team takes security seriously. If you discover a security vulnerability in the train-k8s-container plugin, please report it responsibly.
- Email: saf-security@mitre.org
- GitHub: Use the Security tab to report vulnerabilities privately
When reporting security issues, please provide:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Suggested fix (if you have one)
- Acknowledgment: Within 48 hours
- Initial Assessment: Within 7 days
- Fix Timeline: Varies by severity (critical: 7-14 days, high: 14-30 days)
| Version | Supported |
|---|---|
| 2.x.x | Yes |
| < 2.0 | No |
- Keep Updated: Use the latest version of the plugin
- Secure Credentials: Never commit kubeconfig files to version control
- Use RBAC: Configure minimal Kubernetes RBAC permissions for scanner service accounts
- Network Security: Use network policies to restrict pod-to-pod communication
- Dependency Scanning: Run
bundle auditbefore submitting PRs - Credential Handling: Never log or expose credentials in code
- Input Validation: Sanitize all user inputs
- Test Security: Include security tests for new features
The plugin includes comprehensive security testing:
# Check for vulnerable dependencies
bundle exec bundle-audit check --update
# Run security workflow locally
bundle exec rake securityThis project implements comprehensive automated security scanning:
- Tool: TruffleHog OSS
- Frequency: Every push, pull request, and weekly
- Coverage: 800+ secret types (API keys, tokens, credentials)
- Tool: bundler-audit
- Frequency: Every push, pull request, and weekly
- Database: Ruby Advisory Database (continuously updated)
- Tool: CycloneDX Ruby
- Format: JSON
- Retention: 90 days in GitHub artifacts
- Standard: OWASP CycloneDX specification
This plugin executes commands via kubectl exec. Security considerations:
- Command injection: Commands are sanitized with
Shellwords.escape - ANSI sequences: Output is sanitized to prevent terminal escape attacks (CVE-2021-25743)
- Credentials: Uses kubeconfig authentication (same security as kubectl)
- RFC 1123 validation: Pod and container names are validated
- Requires existing kubectl access to target namespace/pod
- Does not bypass Kubernetes RBAC
- Runs commands with container's default user permissions
- Security issues: saf-security@mitre.org
- General questions: saf@mitre.org or open a GitHub issue