| ▲ | Show HN: Kubesplaining CLI that maps RBAC privilege-escalation paths in K8s(github.com) | |
| 2 points by 0hardik1 10 hours ago | 1 comments | ||
There are many Kubernetes security scanners out there, and most give you results that say "this resource is misconfigured." Kubesplaining tries to answer this: Given the RBAC bindings and pods you already have, how would an attacker move from a low-privilege subject to cluster-admin, host root, or kube-system secrets? It walks the RBAC graph from every non-system subject and chains risky permissions into concrete attack paths. Heavily inspired by Cloudsplaining, which does the same job for AWS IAM. | ||
| ▲ | 0hardik1 10 hours ago | parent [-] | |
[dead] | ||