Helm Charts for Kubernetes Applications: Evolution, Outdatedness and Security Risks

被引:3
|
作者
Zerouali, Ahmed [1 ]
Opdebeeck, Ruben [1 ]
De Roover, Coen [1 ]
机构
[1] Vrije Univ Brussel, Brussels, Belgium
来源
2023 IEEE/ACM 20TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES, MSR | 2023年
关键词
Kubernetes; Helm; Software Ecosystem; Infrastructure-as-code; Evolution; Security;
D O I
10.1109/MSR59073.2023.00078
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Using Kubernetes for the deployment, management and scaling of containerized applications has become a common practice. To facilitate the installation and management of these applications, practitioners can use the Helm package manager to assemble their configuration files into charts. The latter are reusable packages of pre-configured Kubernetes resources that can be deployed as a unit. In this paper, we aim to support chart developers and users by carrying out a comprehensive study on publicly available charts. For 9,482 charts that are distributed via the Artifact Hub repository, we mine and collect the list of their metadata, versions, dependencies, maintainers and container images. Then, we carry out an empirical analysis to assess the state and evolution of charts, as well as the outdatedness and security risks of their images. We found that the ecosystem forming around Helm charts is growing fast. However, most of the charts are not official with no popularity and no license. We also observed that charts tend to release multiple versions, but around half of them are still in the initial development phase. When looking at the container images used in charts, we found that around half of them are outdated and 88.1% of them are exposed to vulnerabilities, jeopardizing 93.7% of the charts.
引用
收藏
页码:523 / 533
页数:11
相关论文
共 22 条
  • [1] Scalable Runtime Integrity Protection for Helm Based Applications on Kubernetes Cluster
    Gajananan, Kugamoorthy
    Kitahara, Hirokuni
    Kudo, Ruriko
    Watanabe, Yuji
    2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 2362 - 2371
  • [2] Risks, Controls, and Security:Concepts and Applications
    Cong, Yu
    Schiff, Andrew
    ISSUES IN ACCOUNTING EDUCATION, 2008, 23 (02): : 346 - 347
  • [3] Addressing Security and Privacy Risks in Mobile Applications
    Jain, Anurag Kumar
    Shanbhag, Devendra
    IT PROFESSIONAL, 2012, 14 (05) : 28 - 33
  • [4] Applications and Security Risks of Artificial Intelligence for Cyber Security in Digital Environment
    Aurucci, Paola
    INTELLIGENT ENVIRONMENTS 2018, 2018, 23 : 308 - 317
  • [5] Online Analysis of Security Risks in Elastic Cloud Applications
    Naskos, Athanasios
    Gounaris, Anastasios
    Mouratidis, Haralambos
    Katsaros, Panagiotis
    IEEE CLOUD COMPUTING, 2016, 3 (05): : 26 - 33
  • [6] Analyzing Security and Privacy Risks in Android Video Game Applications
    Phaenthong, Ratiros
    Ngamsuriyaroj, Sudsanguan
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 6, AINA 2024, 2024, 204 : 307 - 319
  • [7] Security risks in MQTT-based Industrial IoT Applications
    Boppana, Tej Kiran
    Bagade, Priyanka
    2022 IEEE INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (IEEE COINS 2022), 2022, : 348 - 352
  • [9] Emerging Risks and Systemic Concerns in Information Security Research and Applications Minitrack
    Rich, Eliot
    Schryen, Guido
    Minch, Robert
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 2957 - 2958
  • [10] Security Assessment of Clickjacking Risks in Web Applications: Metrics Based Approach
    Shahriar, Hossain
    Haddad, Hisham
    30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, 2015, : 791 - 797