Back to all scenarios
Scenario #290
Security
Kubernetes v1.21, Helm v3.8
Privilege Escalation via Unchecked securityContext in Helm Chart
A third-party Helm chart allowed setting arbitrary securityContext, letting users run pods as root in production.
Find this helpful?
What Happened
A chart exposed securityContext overrides without constraints. A developer added runAsUser: 0during deployment, leading to root-level containers.
Diagnosis Steps
- 1Inspected Helm chart values and rendered manifests.
- 2Detected containers with runAsUser: 0.
- 3Reviewed change logs in GitOps pipeline.
Root Cause
Chart did not validate or restrict securityContext fields.
Fix/Workaround
• Forked chart and restricted overrides via schema.
• Implemented OPA Gatekeeper to block root containers.
Lessons Learned
Helm charts can be as dangerous as code.
How to Avoid
- 1Validate all chart values.
- 2Use policy engines to restrict risky configurations.