Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All service groups
AWS
Azure
Google
Kubernetes
All Kubernetes service groups
Container
Deployment
Network Policy
Network
Pod Security Policy
Role
RoleBinding
Service
Report a new vulnerability
RULE
SERVICE GROUP
H
Azure Container Registry admin user is enabled
Container
H
Geo-replication for Azure Container Images is disabled
Container
H
GKE control plane is publicly accessible
Container
M
AKS cluster does not have platform diagnostic logging enabled
Container
M
AKS Kubernetes Dashboard enabled
Container
M
AKS local accounts are enabled
Container
M
AKS managed Azure Active Directory integration is disabled
Container
M
Azure Kubernetes Service instance has RBAC disabled
Container
M
Container could be running with outdated image
Container
M
Container image quarantine is disabled
Container
M
Container insights is disabled for AKS
Container
M
Container is running with host path mount
Container
M
Container is running with multiple open ports
Container
M
Container is running without AppArmor profile
Container
M
Container is running without liveness probe
Container
M
Container's UID could clash with host's UID
Container
M
GKE legacy endpoint enabled
Container
M
GKE Workload Identity is disabled
Container
M
Kubernetes API Server allows public access
Container
M
Pods should not run containers with the NET_RAW capability
Container
L
AKS cluster Network Policy feature is disabled
Container