Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All service groups
AWS
Azure
All Azure service groups
API Management
App Service (Web Apps)
Authorization
Automation
Batch
CDN
Compute
Container
CosmosDB (DocumentDB)
Data Factory
Data Lake
Database
Key Vault
Monitor
Network
Redis
Role
Search
Security Center
Service Fabric
Storage
Synapse
Google
Kubernetes
Report a new vulnerability
RULE
SERVICE GROUP
H
Azure Container Registry admin user is enabled
Container
H
Geo-replication for Azure Container Images is disabled
Container
H
GKE control plane is publicly accessible
Container
M
AKS cluster does not have platform diagnostic logging enabled
Container
M
AKS Kubernetes Dashboard enabled
Container
M
AKS local accounts are enabled
Container
M
AKS managed Azure Active Directory integration is disabled
Container
M
Azure Kubernetes Service instance has RBAC disabled
Container
M
Container could be running with outdated image
Container
M
Container image quarantine is disabled
Container
M
Container insights is disabled for AKS
Container
M
Container is running with host path mount
Container
M
Container is running with multiple open ports
Container
M
Container is running without AppArmor profile
Container
M
Container is running without liveness probe
Container
M
Container's UID could clash with host's UID
Container
M
GKE legacy endpoint enabled
Container
M
GKE Workload Identity is disabled
Container
M
Kubernetes API Server allows public access
Container
M
Pods should not run containers with the NET_RAW capability
Container
L
AKS cluster Network Policy feature is disabled
Container