-
Notifications
You must be signed in to change notification settings - Fork 180
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AI PRP: Request Weak Credential tester for Argo CD #419
Comments
I would like to work on this |
Hi @redex557, Thanks for picking up this request. Please complete the following items before the implementation:
|
@redex557 Is there any update on this request? If not, I will release this back to the pool. |
@maoning I already wrote a plugin for Argo CD and I think you should assign this to me, this is two weeks now, and according to the rules, this AI PRP should be back in the pool now! |
@maoning there is one default credential for current recent versions in here. |
@JamesFoxxx Thanks for providing the details, including the default credential you linked is sufficient for this weak credential tester. Could you check how to test for successful authentication for ArgoCD (is relying on network request sufficient)? |
@maoning argo-cd contains a login page, we can check for successful login message. |
@JamesFoxxx Please complete the following items before the implementation:
|
@maoning I found two additional default passwords here: https://github.com/argoproj/argo-cd/blob/dd3bb2bad44293a6d0852674d1982e9d066b6001/docs/faq.md?plain=1#L59-L64 |
From: https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/abusing-argo-cd-helm-and-artifact-hub-an-analysis-of-supply-chain-attacks-in-cloud-native-applications
Please read the rules of engagement first at #409.
The text was updated successfully, but these errors were encountered: