6/19/2023 0 Comments Docker image location mac os x![]() It inherently could be a target for Remote Code Execution (RCE) attacks. The ADO pipelines agent is a software product designed to execute code it downloads from external sources. The folders controlled by the agent should be restricted to as few users as possible and they contain secrets that could be decrypted or exfiltrated. ![]() The user configuring the agent needs pool admin permissions, but the user running the agent does not. Information security for self-hosted agents You should run agent setup manually the first time.Īfter you get a feel for how agents work, or if you want to automate setting up many agents, consider using unattended config. ![]() If you're building from a Subversion repo, you must install the Subversion client on the machine.
0 Comments
Leave a Reply. |