ianmiell / bad-dockerfile
A Dockerfile that creates an image with known vulnerabilities.
☆49Updated 3 years ago
Alternatives and similar repositories for bad-dockerfile:
Users that are interested in bad-dockerfile are comparing it to the libraries listed below
- Bash wrapper script for Aquasec Microscanner☆61Updated 5 years ago
- The Container Security Book—a free book for practitioners☆82Updated 5 years ago
- An actuary is a business professional who analyzes the financial consequences of risk.☆79Updated 7 years ago
- A static analysis tool for Terraform plans.☆45Updated 2 years ago
- Kubernetes Common Configuration Scoring System☆124Updated 2 years ago
- Darkbit Cloud Security Tools☆25Updated 4 years ago
- ☆29Updated 3 months ago
- Kubernetes security scanner based on the open-source container vulnerability scanner Trivy.☆23Updated 4 years ago
- Enhance the security of the EC2 metadata service. (Obsolete thanks to Instance Metadata Service Version 2, see note in README)☆31Updated 5 years ago
- Falco container runtime security extras (default rulesets and more)☆49Updated 6 years ago
- a security controller for Kubernetes☆14Updated 6 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆103Updated 5 years ago
- Kubernetes admission webhook that uses cosign verify to check the subject and issuer of the image matches what you expect☆23Updated 3 weeks ago
- Kubernetes operator for Falco that allows developers to manage rules for detecting intruders and backdoors☆68Updated 4 years ago
- Links and resources for the O'Reilly Kubernetes Security book☆98Updated 4 years ago
- Owasp Zap chart for Kubernetes☆50Updated 3 years ago
- RBAC in Kubernetes visualizer☆24Updated 5 years ago
- Drift detection and reporting for Terraform.☆27Updated 3 years ago
- ☆33Updated 5 years ago
- Scripts to create a minimal mesos or nomad cluster using terraform.☆39Updated 6 years ago
- A simple way to evaluate the security of your Kubernetes deployment against sets of best practices defined by various community sources☆28Updated 5 years ago
- Cloud Native Security Hub - Security Resources☆54Updated 5 years ago
- Example of how to write OPA rules with conftest in a modular fashion for Terraform 0.12 plans.☆12Updated 5 years ago
- ⛔ DEPRECATED: A secure jenkins installation☆17Updated 5 years ago
- A known vulnerable Flask app with an excessive amount of automated testing☆13Updated last month
- Making CoreOS' Clair easily work in CI/CD pipelines☆29Updated last year
- Container Security Workshop covering using Falco on Kubernetes.☆105Updated 4 years ago
- A forward proxy for machines, with access control lists☆16Updated last year
- An AWS cross-account tool to support human access with MFA for the CLI and GUI.☆19Updated 6 years ago
- Kubernertes security workshop☆64Updated 6 years ago