Skip to main content

Kubernetes YAML Security Analyzer

Paste or upload a Kubernetes manifest to check for security misconfigurations, missing hardening controls, insecure RBAC, and more. Analysis runs entirely in your browser — no data is sent to any server.

What this tool checks

Workloads

  • Privileged containers
  • hostPID / hostNetwork / hostIPC
  • shareProcessNamespace
  • allowPrivilegeEscalation
  • runAsNonRoot / runAsUser
  • readOnlyRootFilesystem
  • procMount: Unmasked
  • Linux capabilities (drop ALL)
  • Dangerous capabilities added
  • hostPath volume mounts
  • Container runtime socket mounts
  • hostPort exposure
  • Image tag discipline (no :latest)
  • Image pinning by digest
  • Inline sensitive env values
  • Resource limits (CPU / memory)
  • Liveness / readiness probes
  • Seccomp profile
  • AppArmor profile
  • Default ServiceAccount usage
  • automountServiceAccountToken

RBAC

  • Wildcard verbs (*)
  • Wildcard resources (*)
  • Wildcard apiGroups (*)
  • Privilege escalation verbs
  • Access to Secrets
  • RoleBinding modification rights
  • pods/exec, pods/attach, pods/portforward
  • Workload create/update (RCE pivot)
  • Node modify and proxy
  • CSR signing / approval
  • Webhook configuration modify
  • serviceaccounts/token (TokenRequest)
  • PersistentVolume create/update
  • cluster-admin bindings
  • Anonymous / unauthenticated subjects
  • system:masters group bindings

Other Resources

  • Ingress TLS configuration
  • Service type (NodePort / LoadBalancer)
  • Service externalIPs (traffic hijacking)
  • NetworkPolicy pod selector scope
  • ConfigMap sensitive key detection
  • ServiceAccount token auto-mount
  • PersistentVolume hostPath
  • Mutating / Validating webhook configs
  • Deprecated PodSecurityPolicy