kubesploit Profile Banner
Kubesploit Profile
Kubesploit

@kubesploit

Followers
20K
Following
496
Media
785
Statuses
2K

News and links on Kubernetes security curated by the @Learnk8s team Mastodon: @[email protected]

More K8s news, events, jobs →
Joined March 2021
Don't wanna be here? Send us removal request.
@kubesploit
Kubesploit
14 hours
The article demonstrates how to disable anonymous Kubernetes API server authentication globally using a new AuthenticationConfiguration object while preserving health check endpoints. ➜
0
3
26
@kubesploit
Kubesploit
2 days
This tutorial shows how to configure External Secrets Operator in EKS, AKS, GKE, and self-managed clusters using OIDC-based identity federation. ➜
0
5
42
@kubesploit
Kubesploit
3 days
This guide shows how to detect Kubernetes runtime threats (e.g. sudo misuse, suspicious file access) using Falco + eBPF, forward logs with Fluent Bit, and route them to Parseable log streams like `falcowarn` or `falconotice`. ➤
Tweet media one
0
1
38
@kubesploit
Kubesploit
4 days
Learn how Confidential Containers use Kata Agent Policies to control container execution in secure environments. This allows administrators to define granular rules restricting images, processes, and actions. ➤
0
2
27
@kubesploit
Kubesploit
5 days
RT @K8sFM: 🗣️ @SudermanJr, CTO at @fairwindsops, discusses three key areas in Kubernetes: mutating admission policy, dynamic resource alloc….
0
1
0
@kubesploit
Kubesploit
5 days
kpatch enables runtime kernel function patching by injecting precompiled replacement functions directly into the live kernel. It's built on the `CONFIG_LIVEPATCH` infrastructure and uses `ftrace` to reroute function calls at runtime. ➤
Tweet media one
0
1
5
@kubesploit
Kubesploit
5 days
Secrets Webhook is a tool that enables direct secret injection into Kubernetes Pods through a mutating webhook. ➜
0
1
32
@kubesploit
Kubesploit
6 days
Gatekeeper's `k8sallowedrepos` can be bypassed if repo entries lack a trailing `/`. Attackers exploit prefix matching to pull images from fake subdomains like `. Aqua shows real examples, a fixed v2 policy, and Trivy detection. ➜
Tweet media one
0
0
13
@kubesploit
Kubesploit
6 days
Distroless images improve security but lack shell/debug tools. This article shows two solutions: attach a temporary ephemeral container using kubectl debug, or define a persistent sidecar with a shared PID namespace. ➤
0
0
22
@kubesploit
Kubesploit
6 days
RT @K8sFM: 🗣️ @YakirKad and Assaf Morag from @AquaSecTeam highlight how even sectors known for their security, such as finance and insuranc….
0
1
0
@kubesploit
Kubesploit
6 days
Tweet media one
0
1
0
@kubesploit
Kubesploit
7 days
kubectl-rexec enforces auditable pod shell access by blocking native kubectl exec via a ValidatingWebhook and routing sessions through a proxied APIService that logs all activity. ➤
0
2
22
@kubesploit
Kubesploit
7 days
k8s-aws-iam-controller automates trust policy management for IAM Roles used in IRSA setups. It watches annotated ServiceAccounts, validates via RoleUsagePolicy, and updates the role trust statements. ➜
1
3
26
@kubesploit
Kubesploit
7 days
RT @learnk8s: This week on the Learn Kubernetes Weekly:. 🍯 Securing Kubernetes with honeypots.💻 Autoscale with My MacBook Screen Lock.💣 Ing….
0
7
0
@kubesploit
Kubesploit
8 days
Learn how Beelzebub runs honeypots inside your Kubernetes cluster to detect lateral movement. It fakes real services, captures attacker commands like docker ps or ls, and logs them for analysis via Grafana or fluentd. ➜
Tweet media one
0
3
12
@kubesploit
Kubesploit
9 days
Nova scans your cluster for installed Helm charts, cross-checks them with public repos and flags outdated or deprecated charts and container images. ➜
0
3
25
@kubesploit
Kubesploit
9 days
RT @K8sFM: 🗣️ @timsaprogrammer CEO and Co-founder at @kusaridev explains how GitOps and Flux improve security through automated workflows….
0
2
0
@kubesploit
Kubesploit
10 days
ZTM (Zero Trust Mesh) offers a secure, decentralized alternative to Kubernetes service exposure methods like LoadBalancer and Ingress. It uses encrypted tunnels and zero-trust principles to eliminate open ports and simplify cross-cluster/remote access. ➤
0
2
22
@kubesploit
Kubesploit
11 days
Kubewarden deploys as an admission controller, loading user-defined WebAssembly policies that inspect and validate API requests in real time. It enforces resource compliance before persistence, supporting custom logic and dynamic updates cluster-wide. ➤
Tweet media one
0
0
10
@kubesploit
Kubesploit
12 days
Learn how to create a precise policy that tracks critical cluster events, secures sensitive data, and provides actionable security insights without overwhelming log volumes. ➤
0
6
31