Checks for vulnerabilities in a running k8s cluster
Project description
Get Started in 60 seconds !
Make sure you meet the following prerequisites
Prerequisites:
- kubectl is configured to connect to cluster.
- Optional, but highly recommended: make sure you are in a python venv.
Simply run the following commands, and run your first scan.
pip install ismyk8ssecure
ismyk8ssecure
How It Works:
This tool consists of 3 components:
Advisories:
These are yaml files with following schema:
vulnerability_id:
vulnerability_description:
vulnerable_components:
- component_name:
vulnerable_versions: [] # These are computed from `vulnerable_version_ranges`
vulnerable_version_ranges: [] # These are manually filled
references: []
last_updated_at:
created_at:
Advisories can be found in the advisories
directory in this repo.
Version Detectors:
These are functions which detects the version of a particular k8s component. See examples in TODO.
Vulnerability Detectors:
These are functions defined per (vulnerability, k8s component) pair. They are called depending upon the results of above 2 components. They verify whether the corresponding "vulnerability" is present in the detected "k8s component".
Roadmap:
-
Convert most of the kubernetes security advisories into machine readable format.
-
Implement fine tuned vulnerability detectors and eventually become a smart npm audit.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file ismyk8ssecure-0.0.2.tar.gz
.
File metadata
- Download URL: ismyk8ssecure-0.0.2.tar.gz
- Upload date:
- Size: 7.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.7.0 importlib_metadata/4.8.2 pkginfo/1.8.1 requests/2.26.0 requests-toolbelt/0.9.1 tqdm/4.62.3 CPython/3.9.5
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 7627825e5106056e31a306df61a8fd88e85fbb74a1c98e88db6ba7c2243fb96a |
|
MD5 | d013675e428dc17c73b5d169fe394ccd |
|
BLAKE2b-256 | 860469b5116b5930f49148d9cc45c0b543cc1dd249239c8613932ac74f8d1042 |