Submitter : c2a
Date: 3 February 2022
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://apiiro.com/blog/malicious-kubernetes-helm-charts-can-be-used-to-steal-sensitive-information-from-argo-cd-deployments/