Homepage

Find out if you have vulnerabilities that put you at risk

Test your applications
Toggle filtering controls

AWS

Azure

Google

Kubernetes

Report a new vulnerability
RULESERVICE GROUP
  • H
Logging is disabled on Kubernetes engine clusters
Kubernetes (Container) Engine
  • M
EKS control plane logging insufficient.
Kubernetes (Container) Engine
  • M
GKE client certificate authentication is enabled
Kubernetes (Container) Engine
  • M
GKE cluster might be publicly exposed
Kubernetes (Container) Engine
  • M
GKE data encryption-at-rest is not enabled
Kubernetes (Container) Engine
  • M
GKE Network Policies enforcement disabled
Kubernetes (Container) Engine
  • M
GKE Stack driver monitoring disabled
Kubernetes (Container) Engine
  • M
Kubernetes Cluster is not VPC-Native.
Kubernetes (Container) Engine
  • M
Legacy ABAC is enabled
Kubernetes (Container) Engine
  • M
Pods and containers should apply a security context
Kubernetes (Container) Engine
  • L
GKE Alias IP disabled
Kubernetes (Container) Engine
  • L
GKE cluster labels are missing
Kubernetes (Container) Engine
  • L
GKE Node Pool auto repair is disabled
Kubernetes (Container) Engine
  • L
GKE Node Pool auto upgrade disabled
Kubernetes (Container) Engine
  • L
GKE Node pool does not use a container-optimized OS
Kubernetes (Container) Engine
  • L
GKE PodSecurityPolicy controller is disabled
Kubernetes (Container) Engine
  • L
GKE Shield is disabled
Kubernetes (Container) Engine
     
Product
  • Partners
  • Developers & Devops Features
  • Enterprise Features
  • Pricing
  • Test with GitHub
  • Test with CLI
  • API status
Resources
  • Vulnerability DB
  • Blog
  • Documentation
  • FAQs
Company
  • About
  • Jobs
  • Contact
  • Legal terms
  • Privacy
  • Press kit
  • Events
Contact us
  • Support
  • Report a new vuln

Find us online

Track our development

DevSecOps Community Podcast

© 2026 Snyk Ltd.