Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All service groups
AWS
Azure
Google
Kubernetes
All Kubernetes service groups
Container
Deployment
Network Policy
Network
Pod Security Policy
Role
RoleBinding
Service
Report a new vulnerability
RULE
SERVICE GROUP
H
Service is using an external IP
Service
M
Pod stores secrets in environment variables
Service
M
Roles and cluster roles should not grant 'get', 'list', or 'watch' permissions for secrets
Service
M
Service does not restrict ingress sources
Service
L
Pod spec 'automountServiceAccountToken' should be set to 'false'
Service