Homepage

Find out if you have vulnerabilities that put you at risk

Test your applications
Toggle filtering controls

AWS

Azure

Google

Kubernetes

Report a new vulnerability
RULESERVICE GROUP
  • H
Azure Container Registry admin user is enabled
Container
  • H
Geo-replication for Azure Container Images is disabled
Container
  • H
GKE control plane is publicly accessible
Container
  • M
AKS cluster does not have platform diagnostic logging enabled
Container
  • M
AKS Kubernetes Dashboard enabled
Container
  • M
AKS local accounts are enabled
Container
  • M
AKS managed Azure Active Directory integration is disabled
Container
  • M
Azure Kubernetes Service instance has RBAC disabled
Container
  • M
Container could be running with outdated image
Container
  • M
Container image quarantine is disabled
Container
  • M
Container insights is disabled for AKS
Container
  • M
Container is running with host path mount
Container
  • M
Container is running with multiple open ports
Container
  • M
Container is running without AppArmor profile
Container
  • M
Container is running without liveness probe
Container
  • M
Container's UID could clash with host's UID
Container
  • M
GKE legacy endpoint enabled
Container
  • M
GKE Workload Identity is disabled
Container
  • M
Kubernetes API Server allows public access
Container
  • M
Pods should not run containers with the NET_RAW capability
Container
  • L
AKS cluster Network Policy feature is disabled
Container
                                               
Product
  • Partners
  • Developers & Devops Features
  • Enterprise Features
  • Pricing
  • Test with GitHub
  • Test with CLI
  • API status
Resources
  • Vulnerability DB
  • Blog
  • Documentation
  • FAQs
Company
  • About
  • Jobs
  • Contact
  • Legal terms
  • Privacy
  • Press kit
  • Events
Contact us
  • Support
  • Report a new vuln

Find us online

Track our development

DevSecOps Community Podcast

© 2026 Snyk Ltd.