Write-ups
Check The Published Writeups
WDB | Title | Tags | Programs | Authors | Type | Publication | Added |
---|---|---|---|---|---|---|---|
1856 | Malicious Kubernetes Helm Charts can be used to steal sensitive information from Argo CD deployments | Supply chain attack CI/CD | Argo CD | Apiiro’s Security Research | Bug Bounty | 2022-02-03 | 2023-06-13 |