Steve Perkins activity https://gitlab.com/steve-perkins 2025-11-10T16:56:14Z tag:gitlab.com,2025-11-10:4797563289 Steve Perkins pushed to project branch workloads/e872b0a0a4f at Developer Advocacy at GitLab / conferences / KubeCon-NA-2025 / Duo Workshop / Swag Collector... 2025-11-10T16:56:14Z steve-perkins Steve Perkins

Steve Perkins (a4193e1a) at 10 Nov 16:56

Apply 1 suggestion(s) to 1 file(s)

tag:gitlab.com,2025-11-10:4797562468 Steve Perkins commented on merge request !6 at Developer Advocacy at GitLab / conferences / KubeCon-NA-2025 / Duo Workshop / Swag Collector steve-perkins 2025-11-10T16:55:57Z steve-perkins Steve Perkins

@GitLabDuo Please make that change.

tag:gitlab.com,2025-11-10:4797561743 Steve Perkins pushed to project branch workloads/e872b0a0a4f at Developer Advocacy at GitLab / conferences / KubeCon-NA-2025 / Duo Workshop / Swag Collector... 2025-11-10T16:55:41Z steve-perkins Steve Perkins

Steve Perkins (93f52c26) at 10 Nov 16:55

Apply 1 suggestion(s) to 1 file(s)

tag:gitlab.com,2025-11-10:4797560930 Steve Perkins commented on merge request !6 at Developer Advocacy at GitLab / conferences / KubeCon-NA-2025 / Duo Workshop / Swag Collector steve-perkins 2025-11-10T16:55:24Z steve-perkins Steve Perkins

@GitLabDuo Can you make this change here?

tag:gitlab.com,2025-11-10:4797551839 Steve Perkins pushed to project branch workloads/e872b0a0a4f at Developer Advocacy at GitLab / conferences / KubeCon-NA-2025 / Duo Workshop / Swag Collector... 2025-11-10T16:52:23Z steve-perkins Steve Perkins

Steve Perkins (3ae4f1bc) at 10 Nov 16:52

Duo Workflow: Resolve issue #3

tag:gitlab.com,2025-11-10:4797543472 Steve Perkins opened merge request !6: fix: add security context to Kubernetes deployment at Developer Advocacy at GitLab / conferences / KubeCon-NA-2025 / ... 2025-11-10T16:49:59Z steve-perkins Steve Perkins

Relates to issue #3

This MR was created by Duo in Session 1255185

Changes

  • Add pod-level security context with runAsNonRoot, runAsUser (1000), and fsGroup (2000)
  • Add container-level security context with allowPrivilegeEscalation: false
  • Configure readOnlyRootFilesystem: true for enhanced security
  • Drop all Linux capabilities to minimize attack surface
  • Ensure compliance with Kubernetes Pod Security Standards
tag:gitlab.com,2025-11-10:4797538432 Steve Perkins opened issue #5: 🔴 HIGH: Fix WebSocket DoS Vulnerability in ws Package at Developer Advocacy at GitLab / conferences / KubeCon-NA-2025 / Duo W... 2025-11-10T16:48:18Z steve-perkins Steve Perkins

Security Vulnerability Details

Vulnerability ID: 236933790
Severity: HIGH
Scanner: Dependency Scanning
Location: package-lock.json
Affected Package: ws (WebSocket library)

Issue Description

The ws package is affected by a Denial of Service (DoS) vulnerability when handling requests with many HTTP headers. This can lead to application unavailability and resource exhaustion.

Impact

  • Risk Level: HIGH
  • Attack Vector: HTTP requests with excessive headers
  • Potential Impact:
    • Application denial of service
    • Resource exhaustion (memory/CPU)
    • Service unavailability
    • Potential cascading failures in dependent services
  • Exploitability: High - can be triggered remotely via crafted requests

Affected Functionality

Any WebSocket functionality in the application, including:

  • Real-time communication features
  • WebSocket server endpoints
  • Client-side WebSocket connections
  • Any libraries that depend on the ws package

Remediation Steps

Immediate Actions:

  1. Update ws package to the latest secure version:

    npm update ws
  2. Check for transitive dependencies that might also use ws:

    npm ls ws
  3. Review WebSocket usage in the application:

    grep -r "WebSocket\|ws" src/

Validation Steps:

  1. Run dependency audit: npm audit
  2. Verify vulnerable version is removed: npm ls ws
  3. Test WebSocket functionality after update
  4. Monitor application performance and resource usage
  5. Re-run security scanning to confirm fix

Immediate Mitigation (if update not possible):

  • Implement request header limits at the reverse proxy/load balancer level
  • Add rate limiting for WebSocket connections
  • Monitor resource usage and implement alerts

Testing Checklist:

  • WebSocket connections establish successfully
  • Real-time features work as expected
  • No performance degradation observed
  • Resource usage remains normal under load
  • Security scan shows vulnerability resolved

Prevention Measures

  • Header Validation: Implement limits on HTTP header count and size
  • Rate Limiting: Apply connection and request rate limits
  • Resource Monitoring: Set up alerts for unusual resource consumption
  • Regular Updates: Keep WebSocket libraries updated
  • Load Testing: Include DoS scenarios in testing

Monitoring Recommendations

After remediation, monitor for:

  • Unusual spikes in memory/CPU usage
  • High number of concurrent WebSocket connections
  • Requests with excessive headers
  • Application response time degradation

Priority

This is a HIGH severity vulnerability that should be addressed promptly, especially if the application has public-facing WebSocket endpoints.

References

tag:gitlab.com,2025-11-10:4797537304 Steve Perkins opened issue #4: 🔴 HIGH: Fix tar-fs Path Traversal Vulnerability at Developer Advocacy at GitLab / conferences / KubeCon-NA-2025 / Duo Worksho... 2025-11-10T16:47:57Z steve-perkins Steve Perkins

Security Vulnerability Details

Vulnerability ID: 236933791
Severity: HIGH
Scanner: Dependency Scanning
Location: package-lock.json
Affected Package: tar-fs

Issue Description

The tar-fs package is vulnerable to link following and path traversal attacks when extracting crafted tar files. This vulnerability allows attackers to write files outside the intended extraction directory.

Impact

  • Risk Level: HIGH
  • Attack Vector: Malicious tar file processing
  • Potential Impact:
    • Arbitrary file write outside intended directories
    • Potential code execution if executable files are written to system paths
    • Data corruption or system compromise
  • CVSS: Likely high due to path traversal nature

Affected Functionality

Any code that uses tar-fs to extract tar archives, particularly:

  • File upload processing
  • Package/archive extraction
  • Backup restoration
  • Build processes involving tar files

Remediation Steps

Immediate Actions:

  1. Update tar-fs package to the latest secure version:

    npm update tar-fs
  2. Review package-lock.json to ensure the vulnerable version is removed

  3. Audit tar-fs usage in the codebase:

    grep -r "tar-fs" src/

Validation Steps:

  1. Run dependency audit: npm audit
  2. Verify no vulnerable versions remain: npm ls tar-fs
  3. Test application functionality after update
  4. Re-run security scanning to confirm fix

Code Review Checklist:

  • Identify all tar-fs usage in the application
  • Ensure proper input validation for tar file sources
  • Implement extraction path validation
  • Consider using safer alternatives if tar-fs cannot be updated

Prevention Measures

  • Implement input validation for tar file sources
  • Use allowlists for extraction paths
  • Consider sandboxing tar extraction operations
  • Regular dependency updates and security audits

Priority

This is a HIGH severity vulnerability that should be addressed promptly, especially if the application processes user-uploaded tar files.

References

tag:gitlab.com,2025-11-10:4797535604 Steve Perkins opened issue #3: 🚨 CRITICAL: Fix Privilege Escalation in Kubernetes Deployment at Developer Advocacy at GitLab / conferences / KubeCon-NA-2025... 2025-11-10T16:47:30Z steve-perkins Steve Perkins

Security Vulnerability Details

Vulnerability ID: 236933810
Severity: CRITICAL
Scanner: SAST
Location: chart/templates/deployment.yaml:17

Issue Description

The Kubernetes deployment configuration allows privilege escalation, which poses a critical security risk. This vulnerability could allow a container to escalate its privileges and potentially compromise the entire cluster.

Impact

  • Risk Level: CRITICAL
  • Potential Impact: Full cluster compromise
  • Attack Vector: Container breakout leading to host system access
  • Compliance: Violates Kubernetes security best practices

Remediation Steps

  1. Immediate Action Required: Update the deployment.yaml to include proper security context:
spec:
  template:
    spec:
      securityContext:
        runAsNonRoot: true
        runAsUser: 1000
        fsGroup: 2000
      containers:
      - name: your-container
        securityContext:
          allowPrivilegeEscalation: false
          readOnlyRootFilesystem: true
          runAsNonRoot: true
          runAsUser: 1000
          capabilities:
            drop:
            - ALL
  1. Verify the container image supports running as non-root user
  2. Test the application functionality after applying security context
  3. Validate with security scanning tools

Priority

This is a CRITICAL security vulnerability that should be addressed immediately before any production deployment.

References

tag:gitlab.com,2025-11-10:4797501214 Steve Perkins pushed to project branch main at Developer Advocacy at GitLab / conferences / KubeCon-NA-2025 / Duo Workshop / Swag Collector steve-perkins 2025-11-10T16:37:30Z steve-perkins Steve Perkins

Steve Perkins (44da5cac) at 10 Nov 16:37

Merge branch 'duo-edit-20251110-163218' into 'main'

... and 2 more commits

tag:gitlab.com,2025-11-10:4797501188 Steve Perkins accepted merge request !5: fix: eliminate 'Just now' timestamp and show precise relative times at Developer Advocacy at GitLab / conferences /... 2025-11-10T16:37:29Z steve-perkins Steve Perkins

This change addresses the issue where newly added swag items show "Just now" instead of precise timestamps.

Changes Made

  • Removed the 1-hour condition that displayed "Just now" for recent items
  • Added minute-level precision for items less than 1 hour old
  • Added second-level precision for items less than 1 minute old

Benefits

  • Users can now see exact relative times like "30 seconds ago" or "5 minutes ago"
  • Better tracking and analytics capabilities
  • More precise timestamp information for conference swag collection

Fixes issue #2

tag:gitlab.com,2025-11-10:4797493950 Steve Perkins pushed to project branch duo-edit-20251110-163218 at Developer Advocacy at GitLab / conferences / KubeCon-NA-2025 / Duo Workshop / Swag Collec... 2025-11-10T16:35:05Z steve-perkins Steve Perkins

Steve Perkins (adb014a4) at 10 Nov 16:35

Apply 1 suggestion(s) to 1 file(s)

tag:gitlab.com,2025-11-10:4797485323 Steve Perkins opened merge request !5: fix: eliminate 'Just now' timestamp and show precise relative times at Developer Advocacy at GitLab / conferences / K... 2025-11-10T16:32:35Z steve-perkins Steve Perkins

This change addresses the issue where newly added swag items show "Just now" instead of precise timestamps.

Changes Made

  • Removed the 1-hour condition that displayed "Just now" for recent items
  • Added minute-level precision for items less than 1 hour old
  • Added second-level precision for items less than 1 minute old

Benefits

  • Users can now see exact relative times like "30 seconds ago" or "5 minutes ago"
  • Better tracking and analytics capabilities
  • More precise timestamp information for conference swag collection

Fixes issue #2

tag:gitlab.com,2025-11-10:4797484422 Steve Perkins pushed new project branch duo-edit-20251110-163218 at Developer Advocacy at GitLab / conferences / KubeCon-NA-2025 / Duo Workshop / Swag Colle... 2025-11-10T16:32:20Z steve-perkins Steve Perkins

Steve Perkins (739f7d7c) at 10 Nov 16:32

fix: eliminate 'Just now' timestamp and show precise relative times

tag:gitlab.com,2025-11-10:4797467196 Steve Perkins closed issue #2: bug: more exact timestamp for each swag item at Developer Advocacy at GitLab / conferences / KubeCon-NA-2025 / Duo Workshop /... 2025-11-10T16:27:37Z steve-perkins Steve Perkins

Currently, the swag items are being timestamped with a general date/time, but we need more precise timestamps for each individual swag item collected. This will help with better tracking and analytics of when specific items were obtained during the conference.

The timestamp should capture the exact moment when each swag item is added to the collection, providing more granular data for reporting and analysis purposes.

tag:gitlab.com,2025-11-10:4797467171 Steve Perkins pushed to project branch main at Developer Advocacy at GitLab / conferences / KubeCon-NA-2025 / Duo Workshop / Swag Collector steve-perkins 2025-11-10T16:27:37Z steve-perkins Steve Perkins

Steve Perkins (b7a4bf2a) at 10 Nov 16:27

Merge branch 'workloads/7d63021d20c' into 'main'

... and 2 more commits

tag:gitlab.com,2025-11-10:4797467163 Steve Perkins accepted merge request !4: fix: add precise timestamps for swag items at Developer Advocacy at GitLab / conferences / KubeCon-NA-2025 / Duo Wo... 2025-11-10T16:27:37Z steve-perkins Steve Perkins

Relates to issue #2

This MR was created by Duo in Session 1254938

Changes

  • Implement more precise timestamp tracking for each swag item
  • Ensure timestamps capture the exact moment when items are added
  • Improve timestamp granularity for better analytics and reporting
  • Update timestamp display in the UI to show more detailed time information
tag:gitlab.com,2025-11-10:4797464266 Steve Perkins commented on merge request !4 at Developer Advocacy at GitLab / conferences / KubeCon-NA-2025 / Duo Workshop / Swag Collector steve-perkins 2025-11-10T16:26:52Z steve-perkins Steve Perkins

@GitLabDuo In the deployed app, why do I see a timestamp of "Just now"?

tag:gitlab.com,2025-11-10:4797459940 Steve Perkins commented on merge request !4 at Developer Advocacy at GitLab / conferences / KubeCon-NA-2025 / Duo Workshop / Swag Collector steve-perkins 2025-11-10T16:25:53Z steve-perkins Steve Perkins

@GitLabDuo Would this change still allow sorting features to work for more recently or least recently added items?

tag:gitlab.com,2025-11-10:4797449110 Steve Perkins pushed to project branch workloads/7d63021d20c at Developer Advocacy at GitLab / conferences / KubeCon-NA-2025 / Duo Workshop / Swag Collector... 2025-11-10T16:23:09Z steve-perkins Steve Perkins

Steve Perkins (9fb264b1) at 10 Nov 16:23

Apply 1 suggestion(s) to 1 file(s)