Agentic Cluster Security · alpha

Security Beyond
Configuration.

k8sec scans your cluster configurations and container images, then performs smart data correlation and processing to guide you on a Security-by-Design path.

Built for red/blue teams, DevSecOps and SREs who need one correlated view of attack paths, image risk and misconfigurations across the whole cluster.

Live Focus : Attack Path Discovery
$ k8sec scan-all --cluster production-us-east
> Discovering pods & images... OK
> Correlating cluster configs & CVEs... OK
> Mapping attack paths across namespaces...

Core Capabilities

k8sec runs as a native Kubernetes agent pod, continuously reading cluster state and correlating it with image vulnerabilities and configuration risk to create a live security graph.

Attack Path

Identify how an initial compromise can move across nodes, namespaces and services. k8sec computes attack paths from internet-facing entry points to your most sensitive workloads.

Vulnerabilities Detection

Enumerate every container image and configuration in the cluster, link them to CVEs and misconfigurations, and attach findings directly to the workloads and namespaces that run them.

Intelligence Prioritization

k8sec correlates exploitability, exposure and business criticality to surface the few issues that truly matter, turning thousands of raw findings into a focused Security-by-Design roadmap.

Why k8sec?

k8sec is built for security engineers who need correlated intelligence, not isolated scanner outputs. Every signal is tied back to the workloads and paths that really matter.

Intelligence Correlations

k8sec ingests data from image scanners, RBAC, NetworkPolicies and runtime context and correlates them into a single graph. You see which vulnerabilities align with real attack opportunities – and which are just noise.

From pod → service → role → node, every hop is modeled as a graph edge.

Image Vulnerabilities

Enumerate every image running in your cluster, match it to CVE data, and attach severity to the actual deployments and namespaces. Image risk is shown in context of internet exposure, privileges and data sensitivity.

Example: “nginx:1.19” vulnerable and exposed only on canary → different priority than the ingress gateway in production.

Attack Paths

k8sec builds attack-path graphs that show how a compromised pod can move laterally using service accounts, cluster roles, and misconfigured network boundaries. You get a prioritized list of “shortest paths to crown jewels”.

Combine RBAC analysis, service topology and exposed endpoints into one visual map.

Attack Simulation

Simulate attacker behavior against your modeled graph without destructive exploits. k8sec tests privileges, reachable services, and policy effectiveness to predict which paths would succeed in a real incident.

“If this pod is compromised, which secrets, services and nodes could be reached?”

In-Cluster Agent Graph

k8sec deploys a lightweight agent pod inside your cluster. The same pod acts as a graph controller: it listens to the Kubernetes API (and kubelet signals where available) to build a live model of nodes, pods, identities and flows.

  • Runtime-Aware View Go beyond static YAML. The in-cluster agent sees what’s really running: images, ports, identities and their relationships in real time.
  • Supply Chain to Runtime Connect SBOMs and registry data with the workloads the kubelet actually schedules on nodes, closing the gap between build and runtime.
  • Policy-as-Code Loop Every high-risk pattern can be turned into Kyverno / OPA policies, creating a continuous “detect → simulate → enforce” feedback loop.
k8sec Agent Pod (Graph Controller)

Kubernetes Cluster

kubelet · node-1
kubelet · node-2

The k8sec agent pod listens to the Kubernetes API and kubelet-exposed state, then streams normalized events (images, RBAC, network flows) into a live security graph for correlation and attack-path analysis.

Inspired by modern cloud-native security platforms such as Aqua Security.

Blog & Resources

Publish deep dives, attack-path analyses, and Kubernetes security patterns. Each article can reference real lab scenarios discovered by k8sec in your clusters.

Attack Paths

From Ingress to etcd: A Realistic K8s Kill Chain

Walk through a full attack path discovered by k8sec in a lab cluster – from exposed ingress to a misconfigured ServiceAccount with access to kube-system.

Read article

Image Vulnerabilities

Prioritizing CVEs with Attack-Path Context

Not every critical CVE is critical for your cluster. Learn how k8sec merges image scanning with network and RBAC data to prioritize what to patch first.

Read article

Resources

Kubernetes Security Playbooks & Cheat Sheets

Curated resources: CIS mappings, Kyverno policy packs, kube-hunter lab scenarios, and “red vs blue” runbooks you can adapt to your environment.

Browse resources

Documentation (coming soon)

Link this section to a dedicated docs site (MkDocs, Docusaurus, GitHub Pages) with installation steps, CRD references and example policies for k8sec.

Go to GitHub