writeups.xyz writeups.xyz / Apiiro’s Security Research

Title Vulnerabilities Programs Authors
Malicious Kubernetes Helm Charts can be used to steal sensitive information from Argo CD deployments