yaml.docker-compose.security.seccomp-confinement-disabled.seccomp-confinement-disabled

Author
228
Download Count*
License
Service '$SERVICE' is explicitly disabling seccomp confinement. This runs the service in an unrestricted state. Remove 'seccomp:unconfined' to prevent this.
Run Locally
Run in CI
Defintion
rules:
- id: seccomp-confinement-disabled
patterns:
- pattern-inside: |
version: ...
...
services:
...
- pattern: |
$SERVICE:
...
image: ...
...
security_opt:
- ...
- seccomp:unconfined
message: Service '$SERVICE' is explicitly disabling seccomp confinement. This
runs the service in an unrestricted state. Remove 'seccomp:unconfined' to
prevent this.
metadata:
cwe:
- "CWE-284: Improper Access Control"
references:
- https://docs.docker.com/engine/security/seccomp/
category: security
technology:
- docker-compose
owasp:
- A05:2017 - Broken Access Control
- A01:2021 - Broken Access Control
subcategory:
- audit
likelihood: LOW
impact: HIGH
confidence: LOW
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
languages:
- yaml
severity: WARNING
Examples
seccomp-confinement-disabled.test.yaml
version: "3.9"
services:
# ok: seccomp-confinement-disabled
web:
image: nginx:alpine
# ok: seccomp-confinement-disabled
worker:
image: my-worker-image:latest
security_opt:
- label:user:testuser
# ruleid: seccomp-confinement-disabled
db:
image: mysql
security_opt:
- seccomp:unconfined
Short Link: https://sg.run/KWkY