Skip to main content

Kubernetes YAML Security Analyzer

Paste or upload a Kubernetes manifest to check for security misconfigurations, missing hardening controls, insecure RBAC, and more. Analysis runs entirely in your browser — no data is sent to any server.

What this tool checks

Workloads

  • Privileged containers
  • hostPID / hostNetwork / hostIPC
  • allowPrivilegeEscalation
  • runAsNonRoot / runAsUser
  • readOnlyRootFilesystem
  • Linux capabilities (drop ALL)
  • Dangerous capabilities added
  • hostPath volume mounts
  • Image tag discipline (no :latest)
  • Resource limits (CPU / memory)
  • Liveness / readiness probes
  • Seccomp profile
  • automountServiceAccountToken

RBAC

  • Wildcard verbs (*)
  • Wildcard resources (*)
  • Privilege escalation verbs
  • Access to Secrets
  • RoleBinding modification rights
  • pods/exec and pods/attach access
  • cluster-admin bindings
  • Anonymous / unauthenticated subjects
  • system:masters group bindings

Other Resources

  • Ingress TLS configuration
  • Service type (NodePort / LoadBalancer)
  • NetworkPolicy pod selector scope
  • ConfigMap sensitive key detection
  • ServiceAccount token auto-mount