You're on your way to the next level! Join the Kudos program to earn points and save your progress.
Level 1: Seed
25 / 150 points
Next: Root
1 badge earned
Challenges come and go, but your rewards stay with you. Do more to earn more!
What goes around comes around! Share the love by gifting kudos to your peers.
Keep earning points to reach the top of the leaderboard. It resets every quarter so you always have a chance!
Join now to unlock these features and more
The Atlassian Community can help you and your team get more value out of Atlassian products and practices.
Hi,
I am figuring out how I can harden the underlying docker security for my bamboo agents. Using the the Docker Task Configuration the "Additional arguments" Input field caught my attention. This field allows you to run the container in --privileged mode which is fatal if some one puts sth like the following into the command field
dd if=/dev/zero of=/dev/sda bs=512 count=1 conv=notrunc
(Please see the attached pic for the configuration)
This compromises and destroys the bamboo host machine. Using gVisor or namespaces to harden the security is not possible due to the use of --net=host option in the docker runner.
Happy to hear more about your security setup for the bamboo agent hosts
If users have access to plan configuration they can use same script task to do the thing. That's why it's important to separate Bamboo Server and Bamboo agents. Agents should be executed at some environment which you're not afraid to break if you don't trust users.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.