trivyThe most comprehensive and easy-to-use open source vulnerability scanner for container images

kube-benchThe industry standard tool for checking Kubernetes compliance with the Center for Internet Security (CIS) Benchmark


traceeDetect suspicious behaviors at runtime using eBPF tracing and research-driven behavioral signatures.


kube-hunterPenetration testing that simulates dozens of attack vectors on your Kubernetes cluster
Visibility into real-world exposure to risk

Ensure cloud compliance and secure configuration with Cloud Security Posture Management
See who has permission to perform specific actions on K8s objects