Back to directory
WRITEUP #3019

Malicious Kubernetes Helm Charts can be used to steal sensitive information from Argo CD deployments

AI / LLMSupply chain attackCI/CD
byApiiro’s Security Research
Program
Argo CD
Published
Feb 3, 2022
Added to HackDex
Sep 15, 2022
Read Full Writeuphttps://apiiro.com/blog/malicious-kubernetes-helm-charts-can-be-used-to-steal-sensitive-information-from-argo-cd-deployments/
RELATED WRITEUPS
Revival Hijack – PyPI hijack technique exploited in the wild, puts 22K packages at risk
AI / LLMCI/CD
GitHub Actions Exploitation: Repo Jacking And Environment Manipulation
AI / LLMRepojacking
Unmasking Harmful Content in a Medical Chatbot: A Red Team Perspective
AI / LLMAI
Microsoft Copilot: From Prompt Injection to Exfiltration of Personal Information
AI / LLMAI
Google AI Studio: LLM-Powered Data Exfiltration Hits Again! Quickly Fixed.
AI / LLMAI

Built with ❤️ by Shubham Rawat