shazibulislam / KubeSec

Repository for artifacts to analyze Kubernetes manifests and Helm charts for finding violations of security best practices

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

License: MIT

forthebadge made-with-python

Actions Status

Taintube: Taint Tracking for Security Analysis of Kubernetes Manifests

Environment

We use Conda to manage the virtual environment for KubeSec. To see the content of the environment, see environment.yml.

To use the environment, use the following commands.

# Create
conda env create -f environment.yml

# Activate
conda activate KUBESEC

# Deactivate
conda deactivate

# Export (if you modify the environment)
conda env export > environment.yaml

Collaborators

Akond Rahman (Lead), Rahul Pandita, and Shazibul Islam Shamim

Details

The tool is available as a Docker image: https://hub.docker.com/repository/docker/akondrahman/sli-kube

Instruction to run the tool:

  • docker rm $(docker ps -a -f status=exited -f status=created -q)
  • docker rmi -f $(docker images -a -q)
  • docker pull akondrahman/sli-kube
  • docker images -a
  • docker run --rm -it akondrahman/sli-kube bash
  • cd SLI-KUBE-WORK/KubeSec-master/
  • python3 main.py

About

Repository for artifacts to analyze Kubernetes manifests and Helm charts for finding violations of security best practices


Languages

Language:Python 100.0%