Disable allowPrivilegeEscalation across all charts#1250
Disable allowPrivilegeEscalation across all charts#1250
Conversation
The "allowPrivilegeEscalation" setting has already been in effect for 10 months for the openfaas Helm chart. This PR aims to add belt and braces for any other/additional charts and components. allowPrivilegeEscalation is part of defense in depth to address exploits like CVE-2026-31431 aka "copy.fail" Signed-off-by: Alex Ellis (OpenFaaS Ltd) <alexellis2@gmail.com>
AI Pull Request OverviewSummary
Approval rating (1-10)8 - Effective security hardening with consistent implementation across most charts, minimal risk of regression Summary per fileSummary per file
Overall AssessmentThe PR implements important security hardening by disabling privilege escalation across all Helm charts, providing defense-in-depth against exploits like CVE-2026-31431. The changes are consistent and follow Helm best practices, with low risk of breaking existing functionality given the nature of the setting. Detailed ReviewDetailed ReviewSecurity Context ImplementationThe majority of charts correctly implement the securityContext through Helm values, allowing users to override if needed while providing a secure default. The conditional inclusion in templates ( Inconsistency in pro-builder ChartThe pro-builder chart hardcodes README UpdatesAdding Potential ImpactSince Testing ConsiderationsWhile the PR notes no testing beyond linting is needed, consider validating that deployments succeed with the new securityContext in a test environment to ensure no unexpected validation errors from the Kubernetes API. AI agent details. |
Description
Disable allowPrivilegeEscalation across all charts
Why is this needed?
The "allowPrivilegeEscalation" setting has already been in effect for 10 months for the openfaas Helm chart.
This PR aims to add belt and braces for any other/additional charts and components.
allowPrivilegeEscalation is part of defense in depth to address exploits like CVE-2026-31431 aka "copy.fail"
Who is this for?
All OpenFaaS Standard/Enterprise customers
How Has This Been Tested?
This is an innocuous security setting, no testing needed, beyond linting.
Types of changes