代码拉取完成,页面将自动刷新
# Image user should not be ‘root’
# Running containers with ‘root’ user can lead to a container escape situation.
# It is a best practice to run containers as non-root users, which can be done by
# adding # a ‘USER’ statement to the Dockerfile.
AVD-DS-0002
# Privileged containers share namespaces with the host system and do not offer any security.
# They should be used exclusively for system containers that require high # privileges.
# initcontainers require privileged access
AVD-KSV-0017
# Do not allow privilege escalation from node proxy
# Check whether role permits privilege escalation from node proxy
# gpu plugin in kubelet mode requires "nodes/proxy" resource access
AVD-KSV-0047
# Do not allow update/create of a malicious pod
# Check whether role permits update/create of a malicious pod
# device plugin operator requires access to daemonset creation etc.
AVD-KSV-0048
# HostPath present many security risks and as a security practice it is better to avoid critical host paths mounts.
# Some plugins require access to various host paths
AVD-KSV-0121
# Ignore invalid "readOnlyRootFilesystem" detections
AVD-KSV-0014
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。