HomeTools › K8s YAML Scanner
Free Tool · Original

Kubernetes YAML Security Scanner

Paste a Pod, Deployment, StatefulSet, or DaemonSet manifest. We run 20 checks from NIST SP 800-190, Pod Security Standards (restricted), and the CIS Kubernetes Benchmark — catching privileged, hostPath, hostNetwork, and missing security contexts.

Kubernetes manifest (YAML)
Security findings
Paste a manifest on the left to see findings.
100% client-side. Rules run in your browser using regex + YAML-aware line parsing. Your manifest is never transmitted.

Why a dedicated Kubernetes YAML scanner?

Most security failures in Kubernetes do not come from Kubernetes bugs — they come from manifests that were written in a hurry and never reviewed. A single privileged: true on a Pod effectively disables every isolation guarantee the kernel provides. A hostPath mount of /var/run/docker.sock is a container-escape on a platter. This scanner catches those classes before they land.

The 20 rules

What it does not do

This tool is a static YAML linter. It does not check your cluster's posture (RBAC, audit logs, admission controllers, NetworkPolicies, CNI settings), nor does it validate against a live Kubernetes API. For continuous, cluster-aware scanning across your organization, you need Security Factor 365's IaC Engine, which runs these rules plus 40+ others against every PR and posts a comment with blocking/non-blocking findings.

References

Enforce Pod Security Standards on every pull request

SF365's IaC Engine runs these 20 rules plus 40 more against every Terraform, Helm, Ansible, and raw Kubernetes YAML change — posting blocking findings as PR comments. Fail the build on critical, warn on medium.

Start Free Trial →