Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All service groups
AWS
Azure
Google
Kubernetes
All Kubernetes service groups
Container
Deployment
Network Policy
Network
Pod Security Policy
Role
RoleBinding
Service
Report a new vulnerability
RULE
SERVICE GROUP
H
Roles and cluster roles should not use wildcards for resource, verb, or apiGroup entries
Role
M
Custom Role should be assigned for administering resource locks
Role
M
Role with dangerous permissions
Role
M
Roles and cluster roles should not grant 'create' permissions for pods
Role