Add some pressure to exercise 4.
This commit is contained in:
@ -21,7 +21,7 @@ You're looking over the RHACS Dashboard together in the RHACS console.
|
||||
|
||||
You and Angie both spot it at the same time...
|
||||
|
||||
The core banking payments processor namespace `prd-acme-payments` is vulnerable to the critical log4j vulnerability 😱
|
||||
The core banking payments processor namespace `prd-acme-payments` is vulnerable to the critical log4shell vulnerability 😱
|
||||
|
||||

|
||||
|
||||
@ -47,6 +47,8 @@ If you've successfully secured the banks vulnerable payments processor please po
|
||||
|
||||
> Please review [team name] solution for exercise 4, our payments processor application is now unhackable.
|
||||
|
||||
WARNING: The hackathon team will perform a brief penetration test of the application. If your application is not actually secured and remains exploitable by the log4shell vulnerability one of your OpenShift cluster nodes will be deleted for the lulz. No pressure!
|
||||
|
||||
This exercise is worth `25` points. The event team will reply in slack to confirm your updated team total score 🎉
|
||||
|
||||

|
||||
|
||||
Reference in New Issue
Block a user