Severity: High
Files Affected: Multiple deployment YAMLs in apps/slack-infra/
Impact: Known security vulnerabilities, missing security patches
Issue:
Critical applications are running images from 2021-2023 without updates:
# apps/slack-infra/resources/slack-moderator/deployment.yaml:19
image: gcr.io/k8s-staging-slack-infra/slack-moderator:v20210223-8525eb3
# apps/slack-infra/resources/slack-event-log/deployment.yaml:19
image: gcr.io/k8s-staging-slack-infra/slack-event-log:v20210223-8525eb3
Security Analysis:
- Images are 3-5 years old (as of Jan 2026)
- Likely contain critical CVEs in base images and dependencies
- No automated image scanning or update process evident
- No SBOMs or vulnerability tracking
Known Risk Categories:
- Base OS vulnerabilities (if using Alpine/Ubuntu/Debian from 2021)
- Outdated Go/Node.js runtime vulnerabilities
- Unpatched OpenSSL/glibc vulnerabilities
- Missing security backports
Recommendation:
- Immediate: Security scan all images with Trivy/Grype
- Deploy: Automated image rebuild pipeline (monthly at minimum)
- Implement: Image admission controller (e.g., Kyverno) to block old images
- Create: SLA for security patch deployment (critical: 7 days, high: 30 days)
- Enable: Runtime security monitoring (Falco, Tetragon)
Severity: High
Files Affected: Multiple deployment YAMLs in
apps/slack-infra/Impact: Known security vulnerabilities, missing security patches
Issue:
Critical applications are running images from 2021-2023 without updates:
Security Analysis:
Known Risk Categories:
Recommendation: