Taintube: Taint Tracking for Security Analysis of Kubernetes Manifests
Environment
We use Conda to manage the virtual environment for KubeSec. To see the content of the environment, see environment.yml.
To use the environment, use the following commands.
# Create
conda env create -f environment.yml
# Activate
conda activate KUBESEC
# Deactivate
conda deactivate
# Export (if you modify the environment)
conda env export > environment.yaml
Collaborators
Akond Rahman (Lead), Rahul Pandita, and Shazibul Islam Shamim
Details
The tool is available as a Docker image: https://hub.docker.com/repository/docker/akondrahman/sli-kube
Instruction to run the tool:
- docker rm $(docker ps -a -f status=exited -f status=created -q)
- docker rmi -f $(docker images -a -q)
- docker pull akondrahman/sli-kube
- docker images -a
- docker run --rm -it akondrahman/sli-kube bash
- cd SLI-KUBE-WORK/KubeSec-master/
- python3 main.py