StatCan / aaw-kubeflow-pipelines-secret-scanner

Scan all Kubeflow pipelines for exposed secrets

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

kfp-secret-scanner

Scan for Kubeflow pipelines secrets.

How to use it

  1. Push the app to $REGISTRY/kfp-secret-scanner:$VERSION
  2. Configure the chart/values.yaml file accordingly
  3. Create the elastic-creds secret using create-elk-secret.sh (it will prompt you)
  4. Deploy the helm chart as you please, adding the imagePullSecret and namespace, probably.
  5. If you want, trigger a manual run with ./manual-run.sh -n $NAMESPACE

Then voila! Check kibana.

Screenshot Alerts

Attribution

The secret scanner borrows from Trufflehog, and the code and inspiration for scraping the kubeflow pipelines API came from @wg102's repo.

About

Scan all Kubeflow pipelines for exposed secrets

License:GNU General Public License v2.0


Languages

Language:Python 88.4%Language:Shell 8.8%Language:Dockerfile 2.8%