Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Kube-hunter vulnerability scanner Algorithm? #514

Open
Al4DIN opened this issue Jul 7, 2022 · 0 comments
Open

Kube-hunter vulnerability scanner Algorithm? #514

Al4DIN opened this issue Jul 7, 2022 · 0 comments
Labels
question Further information is requested

Comments

@Al4DIN
Copy link

Al4DIN commented Jul 7, 2022

What are you trying to achieve

I'm working on an MlOps pipeline for a computer vision use case, and I'm currently deploying my bricks on kubernetes but I had the reflexion to think about my cluster security since it will be applied for image classification so I need to be sure that all my components are well configured.
I found out kube-hunter on an online article and was a "quick win" to get most results but I had some misunderstood informations (some I found responses on issues closed and others not).

When I deployed my kube-hunter job as a passive test, I was wondering what type of algorithm or concept behind this "small simple" job? I tried to look on documentation or the repo but I didnt find enough infos or hints.

Minimal example (if applicable)

This is the job that I used, I also tried to fine tune the arguments so I can test multiple functionalities.

---
apiVersion: batch/v1
kind: Job
metadata:
  name: kube-hunter
spec:
  template:
    metadata:
      labels:
        app: kube-hunter
    spec:
      containers:
        - name: kube-hunter
          image: aquasec/kube-hunter:0.6.8
          command: ["kube-hunter"]
          args: ["--pod"]
      restartPolicy: Never
@Al4DIN Al4DIN added the question Further information is requested label Jul 7, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
question Further information is requested
Projects
None yet
Development

No branches or pull requests

1 participant