Kubernetes YAML Security Analyzer
Paste or upload a Kubernetes manifest to check for security misconfigurations, missing hardening controls, insecure RBAC, and more. Analysis runs entirely in your browser — no data is sent to any server.
What this tool checks
Workloads
- Privileged containers
- hostPID / hostNetwork / hostIPC
- shareProcessNamespace
- allowPrivilegeEscalation
- runAsNonRoot / runAsUser
- readOnlyRootFilesystem
- procMount: Unmasked
- Linux capabilities (drop ALL)
- Dangerous capabilities added
- hostPath volume mounts
- Container runtime socket mounts
- hostPort exposure
- Image tag discipline (no :latest)
- Image pinning by digest
- Inline sensitive env values
- Resource limits (CPU / memory)
- Liveness / readiness probes
- Seccomp profile
- AppArmor profile
- Default ServiceAccount usage
- automountServiceAccountToken
RBAC
- Wildcard verbs (*)
- Wildcard resources (*)
- Wildcard apiGroups (*)
- Privilege escalation verbs
- Access to Secrets
- RoleBinding modification rights
- pods/exec, pods/attach, pods/portforward
- Workload create/update (RCE pivot)
- Node modify and proxy
- CSR signing / approval
- Webhook configuration modify
- serviceaccounts/token (TokenRequest)
- PersistentVolume create/update
- cluster-admin bindings
- Anonymous / unauthenticated subjects
- system:masters group bindings
Other Resources
- Ingress TLS configuration
- Service type (NodePort / LoadBalancer)
- Service externalIPs (traffic hijacking)
- NetworkPolicy pod selector scope
- ConfigMap sensitive key detection
- ServiceAccount token auto-mount
- PersistentVolume hostPath
- Mutating / Validating webhook configs
- Deprecated PodSecurityPolicy