Back to all scenarios
Scenario #294
Security
Kubernetes v1.24, ArgoCD

ArgoCD Exploit via Unverified Helm Charts

ArgoCD deployed a malicious Helm chart that added privileged pods and container escape backdoors.

Find this helpful?
What Happened

A team added a new Helm repo that wasn’t verified. The chart had post-install hooks that ran containers with host access.

Diagnosis Steps
  • 1Found unusual pods using hostNetwork and hostPID.
  • 2Traced deployment to ArgoCD application with external chart.
  • 3Inspected chart source – found embedded malicious hooks.
Root Cause

Lack of chart verification or provenance checks.

Fix/Workaround
• Removed the chart and all related workloads.
• Enabled Helm OCI signatures and repo allow-lists.
Lessons Learned

Supply chain security is critical, even with GitOps.

How to Avoid
  • 1Only use verified or internal Helm repos.
  • 2Enable ArgoCD Helm signature verification.