Kubernetes YAML Security Analyzer
Paste or upload a Kubernetes manifest to check for security misconfigurations, missing hardening controls, insecure RBAC, and more. Analysis runs entirely in your browser — no data is sent to any server.
What this tool checks
Workloads
- Privileged containers
- hostPID / hostNetwork / hostIPC
- allowPrivilegeEscalation
- runAsNonRoot / runAsUser
- readOnlyRootFilesystem
- Linux capabilities (drop ALL)
- Dangerous capabilities added
- hostPath volume mounts
- Image tag discipline (no :latest)
- Resource limits (CPU / memory)
- Liveness / readiness probes
- Seccomp profile
- automountServiceAccountToken
RBAC
- Wildcard verbs (*)
- Wildcard resources (*)
- Privilege escalation verbs
- Access to Secrets
- RoleBinding modification rights
- pods/exec and pods/attach access
- cluster-admin bindings
- Anonymous / unauthenticated subjects
- system:masters group bindings
Other Resources
- Ingress TLS configuration
- Service type (NodePort / LoadBalancer)
- NetworkPolicy pod selector scope
- ConfigMap sensitive key detection
- ServiceAccount token auto-mount