{
    "componentChunkName": "component---src-templates-issues-tsx",
    "path": "/issues/321",
    "result": {"data":{"issuesJson":{"id":"7f053240-6500-5a6b-8d20-c78ef7dc21b6","title":"aquasecurity/kube-hunter: 在 Kubernetes 集群中追踪安全弱点","number":321,"bodyHTML":"<div align=\"center\" dir=\"auto\">\n<p dir=\"auto\"><a target=\"_blank\" rel=\"noopener noreferrer nofollow\" href=\"https://camo.githubusercontent.com/a15b413168923d02e21292705ceaf86b92675f98e250c5c896a02ba7504a6eae/68747470733a2f2f63646e2e6a7364656c6976722e6e65742f67682f657279616a662f7475406d61696e2f696d672f696d6167655f32303234303432305f3231343430382e676966\"><img src=\"https://camo.githubusercontent.com/a15b413168923d02e21292705ceaf86b92675f98e250c5c896a02ba7504a6eae/68747470733a2f2f63646e2e6a7364656c6976722e6e65742f67682f657279616a662f7475406d61696e2f696d672f696d6167655f32303234303432305f3231343430382e676966\" width=\"100%\" height=\"3\" data-animated-image=\"\" data-canonical-src=\"https://cdn.jsdelivr.net/gh/eryajf/tu@main/img/image_20240420_214408.gif\" style=\"max-width: 100%; height: auto; max-height: 3px;\"></a><br><br></p>\n<markdown-accessiblity-table><table role=\"table\">\n<thead>\n<tr>\n<th align=\"right\">Repos</th>\n<th align=\"left\"><a href=\"https://github.com/aquasecurity/kube-hunter\">aquasecurity/kube-hunter</a></th>\n</tr>\n</thead>\n<tbody>\n<tr>\n<td align=\"right\"><strong>Views</strong></td>\n<td align=\"left\"><a href=\"https://github.com/opsre/awesome-ops\"><img src=\"https://camo.githubusercontent.com/15a33f223ce3aae8f2607c7ce917a0653b7745418f267cc07410ebab2bc74458/68747470733a2f2f76696577732e77686174696c656172656e65642e746f6461792f76696577732f6769746875622f6171756173656375726974792f6b7562652d68756e7465722e737667\" alt=\"views\" data-canonical-src=\"https://views.whatilearened.today/views/github/aquasecurity/kube-hunter.svg\" style=\"max-width: 100%;\"></a></td>\n</tr>\n<tr>\n<td align=\"right\"><strong>Stars</strong></td>\n<td align=\"left\"><a href=\"https://github.com/opsre/awesome-ops\"><img src=\"https://camo.githubusercontent.com/dc7c3eccae875ffb65799c5af19ecde103f404242faa7be0596affbfb050b3e2/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f73746172732f6171756173656375726974792f6b7562652d68756e7465723f636f6c6f723d663266303864266c6f676f3d556e64657274616c65266c6f676f436f6c6f723d656234363330\" alt=\"stars\" data-canonical-src=\"https://img.shields.io/github/stars/aquasecurity/kube-hunter?color=f2f08d&amp;logo=Undertale&amp;logoColor=eb4630\" style=\"max-width: 100%;\"></a></td>\n</tr>\n<tr>\n<td align=\"right\"><strong>Forks</strong></td>\n<td align=\"left\"><a href=\"https://github.com/opsre/awesome-ops\"><img src=\"https://camo.githubusercontent.com/7fe68facf6c930fd420236a682b254a01a040d15d88c5c26263fd84a685ba9c5/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f666f726b732f6171756173656375726974792f6b7562652d68756e7465723f636f6c6f723d626138366562266c6f676f3d48616e647368616b65266c6f676f436f6c6f723d656136616136\" alt=\"forks\" data-canonical-src=\"https://img.shields.io/github/forks/aquasecurity/kube-hunter?color=ba86eb&amp;logo=Handshake&amp;logoColor=ea6aa6\" style=\"max-width: 100%;\"></a></td>\n</tr>\n<tr>\n<td align=\"right\"><strong>License</strong></td>\n<td align=\"left\"><a href=\"https://github.com/opsre/awesome-ops\"><img src=\"https://camo.githubusercontent.com/2176ee9351a8b325509e09e4abe9b1e1643302d20b20b592db195fcb8ced7af0/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f6171756173656375726974792f6b7562652d68756e7465723f6c6f676f3d64617461253341696d616765253246706e672533426261736536342532436956424f5277304b47676f414141414e53556845556741414144414141414177434159414141425841766d48414141414358424957584d41414173544141414c457745416d70775941414144336b6c45515652346e4f335953557a5555426748384a726f57567255474a66456d3773584e63534446784d544c327069347348456778654e526f77586770455742445552522532424e414e4f4b4f4b36366f6f4b4a4742586545475263574163455646475152484677516d483525324630774861655748493944554455354c356b6e6568644f62377a66652532423139636e434a47495243516945596c514237594a4979474c38616f73756c565a36695246516a69474b6b7564576735614c6c704f70704e586e665071773555304459524a6d56786a4367464633424c755a476d416f5655694b4541726d583744375553677351706f72674761336748664b34483663754262435644334771683141352532424c6745253242467749656e514d306a6f446f66714c6f48564e7742796d384370546e416d327a51713073676478624964515a556c416b7150415a3664676a303541446f59526f6f66792532466f5869726f376b3551586a4c6f70677a4b69514e6c4c4461716f4967754577426a7a7150355066446a45394479495879493633464d547751464d43567271774e61763451666f52673538514625324266724d485172454b3844546f434d714e4179574e4866786d54526f4c4f726d5352566747744466714345715a4f4851727a6f34706243557341333431365169364551394b476a6345465267484f724f4b6e5536574162396247455459656b4b7843766a546167394534706a653534446b3551503862624d4859762532464333756541654a6b50304f4778422532424a70426e4172595238455951516e6f4e31414e4661426e5050356c385372736559514c303641646b30464a5938484f5761424d6c6541486a683068506f73497a6c6f3876304125324633345a694f6548726130714b52504d5653493774762532423932747725324676687855654252713456454c674d376642714b354770526d6f514c584e7075625475367a6f4e52706754386e5051627138347764253246494375767978694b4871694e41664933774d367549684271476b4c696977414f734b44714f68743749747239567938536a52424557667941627225324668523142667056514664484a42253246423268683778376a36517077435665655951326b72554235436c636a3641326d3067576a25324244306d4c34397a573563517943484c4e37726a6c6d6d6174457958582532464372547a412532466f51785a6b576c39474a5443566f25324279546a3837253242346769504b6376307149486f344156344430565a727251493334706e70524d36357875652532467a417265453425324654253246536f676c664542794d7369517441546c4c3352414a355948725378365a44665337307337754d486842705225324659423573305057366f455270316236253246667252684b3353444c35546965364f515548516c5133735644752532427a50636b397657453973747225324236496a533967486d5750616861444a25324277434b364e494242587348423948796b587378774470686c436d416476706c6162554a4e6e5a504239342532464e7436784f6538587a4562503257684d335741673147756236744825324233513150673337365239713475716c6e6f36676448476a444f5139306562303141484d3672596975554a314f713472344656756a35765239427a4d3957674e764f7977446869495951467667626366774166774d764863615067425041253246447948476a50624e394138616d6562636477416444354e6633373574787165774e5552656f797677424958594c645170576c6877465771745061435044334173467541535636717171496c62304a766b564331464c39576b4c55556c55574b337a585a4c46432532423125324642726f46746f364f7358497545594a5034447a7a5732594656316f4a614141414141456c46546b5375516d4343\" alt=\"license\" data-canonical-src=\"https://img.shields.io/github/license/aquasecurity/kube-hunter?logo=data%3Aimage%2Fpng%3Bbase64%2CiVBORw0KGgoAAAANSUhEUgAAADAAAAAwCAYAAABXAvmHAAAACXBIWXMAAAsTAAALEwEAmpwYAAAD3klEQVR4nO3YSUzUUBgH8JroWVrUGJfEm7sXNcSDFxMTL2pi4sHEgxeNRowXgpEWBDURR%2BNANOKOK66ooKJGBXeEGRcWAcEVFGQRHFwQmH5%2F0wHaeWHI9DUDU5L5knehdOb7zfe%2B19cnCJGIRCQiEYlQB7YJIyGL8aosulVZ6iRFQjiGKkudWg5aLlpOppNXnfPqw5U0DYRJmVxjCgFF3BLuZGmAoVUiKEArmX7D7USgsQporgGa3gHfK4H6cuBbCVD3Gqh1A5%2BLgE%2BFwIenQM0joDofqLoHVNwBym8CpTnAm2zQq0sgdxbIdQZUlAkqPAZ6dgj05ADoYRoofy%2FoXiro7k5QXjLopgzKiQNlLDaqoIguEwBjzqP5PfDjE9DyIXyI63FMTwQFMCVrqwNav4QfoRg58QF%2BfrMHQrEK8DToCMqNAyWNHfxmTRoLOrmSRVgGtDfqCEqZOHQrzo4pbCUsA3416Qi6EQ9KGjcEFRgHOrOKnU6WAb9bGETYekKxCvjTag9E4pje54Dk5QP8bbMHYv%2FC3ueAeJkP0OGxB%2BJpBnArYR8EYQQnoN1ANFaBnPP5l8SrseYQL06Adk0FJY8HOWaBMleAHjh0hPosIzlo8v0A%2F34ZiOeHra0qKRPMVSI7tv%2B92tw%2FvhxUeBRq4VELgM7fBqK5GpRmoQLXNpubTu6zoNRpgT8nPQbq84wd%2FICuvyxiKHqiNAfI3wM6uIhBqGkLiiwAOsKDqOht7Itr9Vy8SjRBEWfyAbr%2FhR1BfpVQFdHJB%2FB2hh7x7j6QpwCVeeYQ2krUB5Clcj6A2m0gWj%2BD0mL49zW5cQyCHLN7rjlmmatEyXX%2FCrTzA%2FoQxZkWl9GJTCVo%2ByTj87%2B4giPKcv0qIHo4AV4D0VZrrQI34pnpRM65xue%2FzAreE4%2FT%2FSoglfEByMsiQtATlL3RAJ5YHrSx6ZDfS70s7uMHhBpR%2FYB5s0PW6oERp1b6%2FfrRhK3SDL5Tie6OQUHQlQ3sVDu%2BzPck9vWE9str%2B6IjS9gHmWPahaDJ%2BwCK6NIBBXsHB9HykXsxwDphlCmAdvplabUJNnZPB94%2FNt6xOe8XzEbP2WhM3WAg1Gub6tH%2B3Q1Pg376R9q4uqlno6gdHGjDOQ90eb01AHM6rYiuUJ1Oq4r4FVuj5vR9BzM9WgNvOywDhiIYQFvgbcfwAfwMvHcaPgBPA%2FDyHGjPbN9A8amebcdwAdD5Nf375txqewNUReoyvwBIXYLdQpWlhwFWqtPaCPD3AsFuASV6qqqIlb0JvkVC1FL9WkLUUlUWK3zXZLFC%2B1%2FBroFto6OsXIuEYJP4DzzW2YFV1oJaAAAAAElFTkSuQmCC\" style=\"max-width: 100%;\"></a></td>\n</tr>\n<tr>\n<td align=\"right\"><strong>UpdatedAt</strong></td>\n<td align=\"left\"><a href=\"https://github.com/opsre/awesome-ops\"><img src=\"https://camo.githubusercontent.com/4e960ec392296cf7556187f62a01e6b8a7eb45a73c6ce440ce8e5939ff93fb86/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6173742d636f6d6d69742f6171756173656375726974792f6b7562652d68756e7465723f646973706c61795f74696d657374616d703d636f6d6d6974746572266c6f676f3d64617461253341696d616765253246706e672533426261736536342532436956424f5277304b47676f414141414e5355684555674141414234414141416543415941414141374d4b3669414141414358424957584d41414173544141414c457745416d7077594141414648556c45515652346e4c5658375539615678776d3236646c582532466468627825324232253246516e626b7655627264554151674a4a496655444e574454546d4f76314651554661504a346b7573725630314a7431734e70637453327533626f745a746d786439744a5346536f714b71494635625944464c436f76436c656673747a4a387758524c445a4c7a6e6b634f343535376e3364332532466e655a3472454f515a74315771462532423858467234253242664f4c4565326a6f59307a776638546f795a50766a45676b4c592532426b306d6d72584f36644b696e787a476b30666a5430782532425279723055716e6359637a4d317263347451253242497270324c4758646f344e4334567657715453373277716c632532427231334f527269364b6458646e624f484c6c776c7a4a70524b6e3657342532424b36706f4f434e6e494166486a253246253242776168495a4234764b6e715a6630714a704e49716c2532467638545530634e6c3572627963337730516e54703379324c54614a374d314e617844723266526e315370504736476961323174664533345463614f617931694d55564f5146624659714957536f31573854694156616e43306576584f4542375770313448466232327a453566714c4f433545524c515769644e614e49347545636339693768634a6c644868324e57725135674464624f6c7061756d49754c62326174415144506e7a3062384e6257636d785656524a33486d7870536377777a4f4a6d4b44524765384c6c435a444c4739673754496e5631516c376462586256316533675430574b697243466f6d6b5079767758466c5a474a4f6a563625324253743634757564445a4f55354555636f782532464d455144567674364d62634e3237593341797a687633737061557242365a3971724a534f3139657a6a387032704c426b4a792532426343484a7857493567573574636652527a31645531394766476b6f7539505a4f34736d52396a4746777065783444793362766e6d4b79706f74625531335669646a71595a68726a343972764d457425324625324659714c7a396430304e6a57253246637a67796f394f35317a7336614e6c6f354644747530445a675146686c47584a30644241446f4e6864367576703657686f617967374e394c564748386d443462253246486e667455516f4e4734764c51306769784d716c5725324234714f6a744e48446733723166365969525347785279375576714c62395534716b716e78504f4e7661356c447048723125324279794b524e4b57425a793565644d554842326d3572792532422532424551772532427a6766347a6f39253246306f634e3357527a4c4277344a2532424a7950574372716d4967475974554f735744346f785a46516f50556a4770564871493425324661666b51504336665a5165654d31253242764c7549516e6a754257514444437363726d485039656f4e5041744271664f6e5875614b25324268364a45624772732532427076764d6d78654962683836336162565065597953456f39464a48704e4d464a59253242503563575a6b6667374f3174537759436553514c54593345385130392532464256504a556c78516a7368543142736343593032723955445542667643484236367063665041336c794165336e6772332532463437584467614a7a736c7937787741364e5a746c555550437541487161536a5549502532427375653842525741432532464e6651374a5a505a35397330476a3756747049537a34685125324243706658474d4b685a63764c70554b7866574d386f68766637702532464f446a4842666356463849736b383267314648796b63564645253242555a414158343761452532464d6c34504f3530506e75683025324678346e6d637957507364774468427836436d6b4c562532466746446a594b784f4a4f4674623077517949684c39527943774b33414f664947703159464542686e4d4a634c525745624b644b516f55366e63545a6b494544696341792532463831645675454d3552775066657934784f7830496b25324649324e6e466b692532425761664f6f464959466367595a43797864376543556a626334416d46363566742532466b4d686b336f25324235686337734d4a79716a4a45477659466151464972375930775077384246415925324236253242766d6b3377367a7a5275444d6d5a5652736668385274413075455453443775434254364459514e36697665553066706b594c6a453671725672744f78654e4b553954484c5a4a396b4255324a427342685635416976422532466f4b61514e4b675043427744596149665a4334616454684f71463457454e56694c4a77566f586f62664c424b56773637414f6154734c6336355461564b32317651344c613939654b6359673576627873624f627a5451394e37554b4467554f3177446a6944494942736868357a746733396e514d4c535a4248344f7a424f55444551586d323036643366634c67737762585141345068634b336e6873775531427a3877765130395248472532466f597933656a6677424e6d746f59714c4130586741414141424a52553545726b4a676767253344253344266c6162656c3d557064617465644174\" alt=\"last-commit\" data-canonical-src=\"https://img.shields.io/github/last-commit/aquasecurity/kube-hunter?display_timestamp=committer&amp;logo=data%3Aimage%2Fpng%3Bbase64%2CiVBORw0KGgoAAAANSUhEUgAAAB4AAAAeCAYAAAA7MK6iAAAACXBIWXMAAAsTAAALEwEAmpwYAAAFHUlEQVR4nLVX7U9aVxwm26dlX%2Fdhbx%2B2%2FQnbkvUbrdUAQgJJIfUDNWDTTmOv1FQUFaPJ4kusrV01Jt1sNpctS2u3botZtmxd9tJSFSoqKqIF5bYDFLCovClefstzJ8wXRLDZLznkcO4557n3d3%2FneZ4rEOQZt1WqF%2B8XFr4%2BfOLEe2joY0zwf8ToyZPvjEgkLY%2Bk0mmrXO6dKinxzGk0fjT0x%2BRyr0UqncYczM1rc4tQ%2BIrp2LGXdo4NC4VvWqTS72wqlc%2Br13ORri6KdXdnbOHLlwlzJpRKn6W4%2BK6poOCNnIAfHj%2F%2BwahIZB4vKnqZf0qJpNIql%2Fv8TU0cNl5rbyc3w0QnTp3y2LTaJ7M1NaxDr2fRn1SpPG6Gia21tfE34TcaOay1iMUVOQFbFYqIWSo1W8TiAVanC0evXOEB7Wp14HFb22zE5fqLOC5ERLQWidNaNI4uEcc9i7hcJldHh2NWrQ5gDdbOlpaumIuLb2atAQDPnz0b8NbWcmxVVRJ3HmxpScwwzOJmKDRGe8LlCZDLG9g7TInV1Ql7dbXbV1e3gT0WKirCFomkPyvwXFlZGJOjV6%2BSt64uudDZOU5EUcox%2FMEQDVvt6MbcN27Y3Ayzhv3spaUrB6Z9qrJSO19ezj8p2pLBkJy%2BcCHJxWI5gW5tcfRRz1dU19GfGkou9PZO4smR9jGFwpex4Dy3bvnmKypotbU13VidjqYZhrj49rvMEt%2F%2FYqLz9d00NjW%2Fczgyo9O51zs6aNlo5FDtu0DZgQFhlGXJ0dBADoNhd6uvp6Whoayg7N9LVGH8mD4b%2FHnftUQoNG4vLQ0gixMqlW%2B4qOjtNHDg3r1f6YiRSGxRy7UvqLb9U4qkqnxPONva5lDpHr1%2ByyKRNKWBZy5edMUHB2m5ry%2B%2BEQw%2Bzgf4zo9%2F0ocN3WRzLBw4J%2BJyPWCrqmIgGYtUOsWD4oxZFQoPUjGpVHqI4%2FafkQPC6fZQeeM1%2BvLuIQnjuBWQDDCscrmHP9eoNPAtBqfOnXuaK%2Bh6JEbGrs%2BpvvMmxeIbh863abVPeYySEo9FJHpNMFJY%2BP5cWZkfg7O1tSwYCeSQLTY3E8Q09%2FBVPJUlxQjshT1BscCY02r9UDUBfvCHB66pcfPA3lyAe3ngr3%2F47XDgaJzsly7xwA6NZtlUUPCuAHqaSjUIP%2Bsue8BRWAC%2FNfQ7JZPZ59s0Gj7VtpISz4hQ%2BCpfXGMKhZcvLpUKxfWM8ohvf7p%2FODjHBfcVF8Isk82g1FHykcVFE%2BUZAAX47aE%2FMl4PO50Pnuh0%2Fx4nmcyWPsdwDhBx6CmkLV%2FgFDjYKxOJOFtb0wQyIhL9RyCwK3AOfIGp1YFEBhnMJcLRWEbKdKQoU6ncTZkIEDicAy%2F81dVuEM5RwPfey4xOx0Ik%2FI2NnFki%2BWafOoFIYFcgYZCyxd7eCUjbc4AmF65ft%2FkMhk3o%2B5hc7sMJyqjJEGvYFaQFIr7Y0wPw8BFAY%2B6%2Bvmk3w6zzRuDMmZVRsfh8RtA0uETSD7uCBT6DYQN6iveU0fpkYLjE6qrVrtOxeNKU9THLZJ9kBU2JBsBhV5AivB%2FoKaQNKgPCBwDYaIfZC4adThOqF4WENViLJwVoXobfLBKVw67AOaTsLc65TaVK21vQ4La99eKcYg5vbxsbObzTQ9N7UKDgUO1wDjiDIIBshh5ztg39nQMLSZBH4OzBOUDEQXm206d3fcLgswbXQA4PhcK3nhswU1Bz8wvQ09RHG%2FoYy3ejfwBNmtoYqLA0XgAAAABJRU5ErkJggg%3D%3D&amp;label=UpdatedAt\" style=\"max-width: 100%;\"></a></td>\n</tr>\n<tr>\n<td align=\"right\"><strong>CreatedAt</strong></td>\n<td align=\"left\"><a href=\"https://github.com/opsre/awesome-ops\"><img src=\"https://camo.githubusercontent.com/4e48c2fd4a6bf4d5d45739de2d0d8091faac6c5b864f39788d572d516b6cf8bf/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f637265617465642d61742f6171756173656375726974792f6b7562652d68756e7465723f6c6f676f3d64617461253341696d616765253246706e672533426261736536342532436956424f5277304b47676f414141414e5355684555674141414234414141416543415941414141374d4b3669414141414358424957584d41414173544141414c457745416d7077594141414648556c45515652346e4c5658375539615678776d3236646c582532466468627825324232253246516e626b7655627264554151674a4a496655444e574454546d4f76314651554661504a346b7573725630314a7431734e70637453327533626f745a746d786439744a5346536f714b71494635625944464c436f76436c656673747a4a387758524c445a4c7a6e6b634f343535376e3364332532466e655a3472454f515a74315771462532423858467234253242664f4c4565326a6f59307a776638546f795a50766a45676b4c592532426b306d6d72584f36644b696e787a476b30666a5430782532425279723055716e6359637a4d317263347451253242497270324c4758646f344e4334567657715453373277716c632532427231334f527269364b6458646e624f484c6c776c7a4a70524b6e3657342532424b36706f4f434e6e494166486a253246253242776168495a4234764b6e715a6630714a704e49716c2532467638545530634e6c3572627963337730516e54703379324c54614a374d314e617844723266526e315370504736476961323174664533345463614f617931694d55564f5146624659714957536f31573854694156616e43306576584f4542375770313448466232327a453566714c4f433545524c515769644e614e49347545636339693768634a6c644868324e57725135674464624f6c7061756d49754c62326174415144506e7a3062384e6257636d785656524a33486d7870536377777a4f4a6d4b44524765384c6c435a444c4739673754496e5631516c376462586256316533675430574b697243466f6d6b5079767758466c5a474a4f6a563625324253743634757564445a4f55354555636f782532464d455144567674364d62634e3237593341797a687633737061557242365a3971724a534f3139657a6a387032704c426b4a792532426343484a7857493567573574636652527a31645531394766476b6f7539505a4f34736d52396a4746777065783444793362766e6d4b79706f74625531335669646a71595a68726a343972764d457425324625324659714c7a396430304e6a57253246637a67796f394f35317a7336614e6c6f354644747530445a675146686c47584a30644241446f4e6864367576703657686f617967374e394c564748386d443462253246486e667455516f4e4734764c51306769784d716c5725324234714f6a744e48446733723166365969525347785279375576714c62395534716b716e78504f4e7661356c447048723125324279794b524e4b57425a793565644d554842326d3572792532422532424551772532427a6766347a6f39253246306f634e3357527a4c4277344a2532424a7950574372716d4967475974554f735744346f785a46516f50556a4770564871493425324661666b51504336665a5165654d31253242764c7549516e6a754257514444437363726d485039656f4e5041744271664f6e5875614b25324268364a45624772732532427076764d6d78654962683836336162565065597953456f39464a48704e4d464a59253242503563575a6b6667374f3174537759436553514c54593345385130392532464256504a556c78516a7368543142736343593032723955445542667643484236367063665041336c794165336e6772332532463437584467614a7a736c7937787741364e5a746c555550437541487161536a5549502532427375653842525741432532464e6651374a5a505a35397330476a3756747049537a34685125324243706658474d4b685a63764c70554b7866574d386f68766637702532464f446a4842666356463849736b383267314648796b63564645253242555a414158343761452532464d6c34504f3530506e75683025324678346e6d637957507364774468427836436d6b4c562532466746446a594b784f4a4f4674623077517949684c39527943774b33414f664947703159464542686e4d4a634c525745624b644b516f55366e63545a6b494544696341792532463831645675454d3552775066657934784f7830496b25324649324e6e466b692532425761664f6f464959466367595a43797864376543556a626334416d46363566742532466b4d686b336f25324235686337734d4a79716a4a45477659466151464972375930775077384246415925324236253242766d6b3377367a7a5275444d6d5a5652736668385274413075455453443775434254364459514e36697665553066706b594c6a453671725672744f78654e4b553954484c5a4a396b4255324a427342685635416976422532466f4b61514e4b675043427744596149665a4334616454684f71463457454e56694c4a77566f586f62664c424b56773637414f6154734c6336355461564b32317651344c613939654b6359673576627873624f627a5451394e37554b4467554f3177446a6944494942736868357a746733396e514d4c535a4248344f7a424f55444551586d323036643366634c67737762585141345068634b336e6873775531427a3877765130395248472532466f597933656a6677424e6d746f59714c4130586741414141424a52553545726b4a676767253344253344266c6162656c3d437265617465644174\" alt=\"create-at\" data-canonical-src=\"https://img.shields.io/github/created-at/aquasecurity/kube-hunter?logo=data%3Aimage%2Fpng%3Bbase64%2CiVBORw0KGgoAAAANSUhEUgAAAB4AAAAeCAYAAAA7MK6iAAAACXBIWXMAAAsTAAALEwEAmpwYAAAFHUlEQVR4nLVX7U9aVxwm26dlX%2Fdhbx%2B2%2FQnbkvUbrdUAQgJJIfUDNWDTTmOv1FQUFaPJ4kusrV01Jt1sNpctS2u3botZtmxd9tJSFSoqKqIF5bYDFLCovClefstzJ8wXRLDZLznkcO4557n3d3%2FneZ4rEOQZt1WqF%2B8XFr4%2BfOLEe2joY0zwf8ToyZPvjEgkLY%2Bk0mmrXO6dKinxzGk0fjT0x%2BRyr0UqncYczM1rc4tQ%2BIrp2LGXdo4NC4VvWqTS72wqlc%2Br13ORri6KdXdnbOHLlwlzJpRKn6W4%2BK6poOCNnIAfHj%2F%2BwahIZB4vKnqZf0qJpNIql%2Fv8TU0cNl5rbyc3w0QnTp3y2LTaJ7M1NaxDr2fRn1SpPG6Gia21tfE34TcaOay1iMUVOQFbFYqIWSo1W8TiAVanC0evXOEB7Wp14HFb22zE5fqLOC5ERLQWidNaNI4uEcc9i7hcJldHh2NWrQ5gDdbOlpaumIuLb2atAQDPnz0b8NbWcmxVVRJ3HmxpScwwzOJmKDRGe8LlCZDLG9g7TInV1Ql7dbXbV1e3gT0WKirCFomkPyvwXFlZGJOjV6%2BSt64uudDZOU5EUcox%2FMEQDVvt6MbcN27Y3Ayzhv3spaUrB6Z9qrJSO19ezj8p2pLBkJy%2BcCHJxWI5gW5tcfRRz1dU19GfGkou9PZO4smR9jGFwpex4Dy3bvnmKypotbU13VidjqYZhrj49rvMEt%2F%2FYqLz9d00NjW%2Fczgyo9O51zs6aNlo5FDtu0DZgQFhlGXJ0dBADoNhd6uvp6Whoayg7N9LVGH8mD4b%2FHnftUQoNG4vLQ0gixMqlW%2B4qOjtNHDg3r1f6YiRSGxRy7UvqLb9U4qkqnxPONva5lDpHr1%2ByyKRNKWBZy5edMUHB2m5ry%2B%2BEQw%2Bzgf4zo9%2F0ocN3WRzLBw4J%2BJyPWCrqmIgGYtUOsWD4oxZFQoPUjGpVHqI4%2FafkQPC6fZQeeM1%2BvLuIQnjuBWQDDCscrmHP9eoNPAtBqfOnXuaK%2Bh6JEbGrs%2BpvvMmxeIbh863abVPeYySEo9FJHpNMFJY%2BP5cWZkfg7O1tSwYCeSQLTY3E8Q09%2FBVPJUlxQjshT1BscCY02r9UDUBfvCHB66pcfPA3lyAe3ngr3%2F47XDgaJzsly7xwA6NZtlUUPCuAHqaSjUIP%2Bsue8BRWAC%2FNfQ7JZPZ59s0Gj7VtpISz4hQ%2BCpfXGMKhZcvLpUKxfWM8ohvf7p%2FODjHBfcVF8Isk82g1FHykcVFE%2BUZAAX47aE%2FMl4PO50Pnuh0%2Fx4nmcyWPsdwDhBx6CmkLV%2FgFDjYKxOJOFtb0wQyIhL9RyCwK3AOfIGp1YFEBhnMJcLRWEbKdKQoU6ncTZkIEDicAy%2F81dVuEM5RwPfey4xOx0Ik%2FI2NnFki%2BWafOoFIYFcgYZCyxd7eCUjbc4AmF65ft%2FkMhk3o%2B5hc7sMJyqjJEGvYFaQFIr7Y0wPw8BFAY%2B6%2Bvmk3w6zzRuDMmZVRsfh8RtA0uETSD7uCBT6DYQN6iveU0fpkYLjE6qrVrtOxeNKU9THLZJ9kBU2JBsBhV5AivB%2FoKaQNKgPCBwDYaIfZC4adThOqF4WENViLJwVoXobfLBKVw67AOaTsLc65TaVK21vQ4La99eKcYg5vbxsbObzTQ9N7UKDgUO1wDjiDIIBshh5ztg39nQMLSZBH4OzBOUDEQXm206d3fcLgswbXQA4PhcK3nhswU1Bz8wvQ09RHG%2FoYy3ejfwBNmtoYqLA0XgAAAABJRU5ErkJggg%3D%3D&amp;label=CreatedAt\" style=\"max-width: 100%;\"></a></td>\n</tr>\n</tbody>\n</table></markdown-accessiblity-table>\n<a href=\"https://github.com/opsre/awesome-ops\">\n</a><p dir=\"auto\"><a href=\"https://github.com/opsre/awesome-ops\"><img src=\"https://camo.githubusercontent.com/b964a36ea4078c39f603d46a29436371c7541a2f26e0228d7b21b9d9805b43d3/68747470733a2f2f736f6369616c6966792e6769742e63692f6f707372652f617765736f6d652d6f70732f696d6167653f6465736372697074696f6e3d3126666f6e743d42697474657226666f726b733d31266973737565733d31266c616e67756167653d31266c6f676f3d6874747073253341253246253246617661746172732e67697468756275736572636f6e74656e742e636f6d25324675253246313838353638303230266e616d653d31266f776e65723d31267061747465726e3d436972637569742b426f6172642670756c6c733d31267374617267617a6572733d31267468656d653d4c69676874\" alt=\"\" data-canonical-src=\"https://socialify.git.ci/opsre/awesome-ops/image?description=1&amp;font=Bitter&amp;forks=1&amp;issues=1&amp;language=1&amp;logo=https%3A%2F%2Favatars.githubusercontent.com%2Fu%2F188568020&amp;name=1&amp;owner=1&amp;pattern=Circuit+Board&amp;pulls=1&amp;stargazers=1&amp;theme=Light\" style=\"max-width: 100%;\"></a></p>\n<a target=\"_blank\" rel=\"noopener noreferrer nofollow\" href=\"https://camo.githubusercontent.com/a15b413168923d02e21292705ceaf86b92675f98e250c5c896a02ba7504a6eae/68747470733a2f2f63646e2e6a7364656c6976722e6e65742f67682f657279616a662f7475406d61696e2f696d672f696d6167655f32303234303432305f3231343430382e676966\"><img src=\"https://camo.githubusercontent.com/a15b413168923d02e21292705ceaf86b92675f98e250c5c896a02ba7504a6eae/68747470733a2f2f63646e2e6a7364656c6976722e6e65742f67682f657279616a662f7475406d61696e2f696d672f696d6167655f32303234303432305f3231343430382e676966\" width=\"100%\" height=\"3\" data-animated-image=\"\" data-canonical-src=\"https://cdn.jsdelivr.net/gh/eryajf/tu@main/img/image_20240420_214408.gif\" style=\"max-width: 100%; height: auto; max-height: 3px;\"></a>\n</div>\n<h2 dir=\"auto\">Notice</h2>\n<p dir=\"auto\">kube-hunter is not under active development anymore. If you're interested in scanning Kubernetes clusters for known vulnerabilities, we recommend using <a href=\"https://github.com/aquasecurity/trivy\">Trivy</a>. Specifically, Trivy's Kubernetes <a href=\"https://blog.aquasec.com/trivy-kubernetes-cis-benchmark-scanning\" rel=\"nofollow\">misconfiguration scanning</a> and <a href=\"https://blog.aquasec.com/scanning-kbom-for-vulnerabilities-with-trivy\" rel=\"nofollow\">KBOM vulnerability scanning</a>. Learn more in the <a href=\"https://aquasecurity.github.io/trivy/\" rel=\"nofollow\">Trivy Docs</a>.</p>\n<hr>\n<p dir=\"auto\">kube-hunter hunts for security weaknesses in Kubernetes clusters. The tool was developed to increase awareness and visibility for security issues in Kubernetes environments. <strong>You should NOT run kube-hunter on a Kubernetes cluster that you don't own!</strong></p>\n<p dir=\"auto\"><strong>Run kube-hunter</strong>: kube-hunter is available as a container (aquasec/kube-hunter), and we also offer a web site at <a href=\"https://kube-hunter.aquasec.com\" rel=\"nofollow\">kube-hunter.aquasec.com</a> where you can register online to receive a token allowing you to see and share the results online. You can also run the Python code yourself as described below.</p>\n<p dir=\"auto\"><strong>Explore vulnerabilities</strong>: The kube-hunter knowledge base includes articles about discoverable vulnerabilities and issues. When kube-hunter reports an issue, it will show its VID (Vulnerability ID) so you can look it up in the KB at <a href=\"https://aquasecurity.github.io/kube-hunter/\" rel=\"nofollow\">https://aquasecurity.github.io/kube-hunter/</a><br>\n<em>If you're interested in kube-hunter's integration with the Kubernetes ATT&amp;CK Matrix <a href=\"#kuberentes-attck-matrix\">Continue Reading</a></em></p>\n<p dir=\"auto\"><a href=\"https://youtu.be/s2-6rTkH8a8?t=57s\" rel=\"nofollow\">kube-hunter demo video</a></p>\n<h2 dir=\"auto\">Table of Contents</h2>\n<ul dir=\"auto\">\n<li><a href=\"#table-of-contents\">Table of Contents</a>\n<ul dir=\"auto\">\n<li><a href=\"#kubernetes-attck-matrix\">Kubernetes ATT&amp;CK Matrix</a></li>\n<li><a href=\"#hunting\">Hunting</a>\n<ul dir=\"auto\">\n<li><a href=\"#where-should-i-run-kube-hunter\">Where should I run kube-hunter?</a></li>\n<li><a href=\"#scanning-options\">Scanning options</a></li>\n<li><a href=\"#authentication\">Authentication</a></li>\n<li><a href=\"#active-hunting\">Active Hunting</a></li>\n<li><a href=\"#list-of-tests\">List of tests</a></li>\n<li><a href=\"#nodes-mapping\">Nodes Mapping</a></li>\n<li><a href=\"#output\">Output</a></li>\n<li><a href=\"#dispatching\">Dispatching</a></li>\n</ul>\n</li>\n<li><a href=\"#advanced-usage\">Advanced Usage</a>\n<ul dir=\"auto\">\n<li><a href=\"#azure-quick-scanning\">Azure Quick Scanning</a></li>\n<li><a href=\"#custom-hunting\">Custom Hunting</a></li>\n</ul>\n</li>\n<li><a href=\"#deployment\">Deployment</a>\n<ul dir=\"auto\">\n<li><a href=\"#on-machine\">On Machine</a>\n<ul dir=\"auto\">\n<li><a href=\"#prerequisites\">Prerequisites</a>\n<ul dir=\"auto\">\n<li><a href=\"#install-with-pip\">Install with pip</a></li>\n<li><a href=\"#run-from-source\">Run from source</a></li>\n</ul>\n</li>\n</ul>\n</li>\n<li><a href=\"#container\">Container</a></li>\n<li><a href=\"#pod\">Pod</a></li>\n</ul>\n</li>\n<li><a href=\"#contribution\">Contribution</a></li>\n<li><a href=\"#license\">License</a></li>\n</ul>\n</li>\n</ul>\n<h2 dir=\"auto\">Kubernetes ATT&amp;CK Matrix</h2>\n<p dir=\"auto\">kube-hunter now supports the new format of the Kubernetes ATT&amp;CK matrix.<br>\nWhile kube-hunter's vulnerabilities are a collection of creative techniques designed to mimic an attacker in the cluster (or outside it)<br>\nThe Mitre's ATT&amp;CK defines a more general standardised categories of techniques to do so.</p>\n<p dir=\"auto\">You can think of kube-hunter vulnerabilities as small steps for an attacker, which follows the track of a more general technique he would aim for.<br>\nMost of kube-hunter's hunters and vulnerabilities can closly fall under those techniques, That's why we moved to follow the Matrix standard.</p>\n<p dir=\"auto\"><em>Some kube-hunter vulnerabities which we could not map to Mitre technique, are prefixed with the <code class=\"notranslate\">General</code> keyword</em><br>\n<a target=\"_blank\" rel=\"noopener noreferrer\" href=\"./MITRE.png\"><img src=\"./MITRE.png\" alt=\"kube-hunter\" style=\"max-width: 100%;\"></a></p>\n<h2 dir=\"auto\">Hunting</h2>\n<h3 dir=\"auto\">Where should I run kube-hunter?</h3>\n<p dir=\"auto\">There are three different ways to run kube-hunter, each providing a different approach to detecting weaknesses in your cluster:</p>\n<p dir=\"auto\">Run kube-hunter on any machine (including your laptop), select Remote scanning and give the IP address or domain name of your Kubernetes cluster. This will give you an attackers-eye-view of your Kubernetes setup.</p>\n<p dir=\"auto\">You can run kube-hunter directly on a machine in the cluster, and select the option to probe all the local network interfaces.</p>\n<p dir=\"auto\">You can also run kube-hunter in a pod within the cluster. This indicates how exposed your cluster would be if one of your application pods is compromised (through a software vulnerability, for example). (<em><code class=\"notranslate\">--pod</code> flag</em>)</p>\n<h3 dir=\"auto\">Scanning options</h3>\n<p dir=\"auto\">First check for these <strong><a href=\"#prerequisites\">pre-requisites</a></strong>.</p>\n<p dir=\"auto\">By default, kube-hunter will open an interactive session, in which you will be able to select one of the following scan options. You can also specify the scan option manually from the command line. These are your options:</p>\n<ol dir=\"auto\">\n<li><strong>Remote scanning</strong></li>\n</ol>\n<p dir=\"auto\">To specify remote machines for hunting, select option 1 or use the <code class=\"notranslate\">--remote</code> option. Example:<br>\n<code class=\"notranslate\">kube-hunter --remote some.node.com</code></p>\n<ol start=\"2\" dir=\"auto\">\n<li><strong>Interface scanning</strong></li>\n</ol>\n<p dir=\"auto\">To specify interface scanning, you can use the <code class=\"notranslate\">--interface</code> option (this will scan all of the machine's network interfaces). Example:<br>\n<code class=\"notranslate\">kube-hunter --interface</code></p>\n<ol start=\"3\" dir=\"auto\">\n<li><strong>Network scanning</strong></li>\n</ol>\n<p dir=\"auto\">To specify a specific CIDR to scan, use the <code class=\"notranslate\">--cidr</code> option. Example:<br>\n<code class=\"notranslate\">kube-hunter --cidr 192.168.0.0/24</code></p>\n<ol start=\"4\" dir=\"auto\">\n<li><strong>Kubernetes node auto-discovery</strong></li>\n</ol>\n<p dir=\"auto\">Set <code class=\"notranslate\">--k8s-auto-discover-nodes</code> flag to query Kubernetes for all nodes in the cluster, and then attempt to scan them all. By default, it will use <a href=\"https://kubernetes.io/docs/reference/access-authn-authz/rbac/\" rel=\"nofollow\">in-cluster config</a> to connect to the Kubernetes API. If you'd like to use an explicit kubeconfig file, set <code class=\"notranslate\">--kubeconfig /location/of/kubeconfig/file</code>.</p>\n<p dir=\"auto\">Also note, that this is always done when using <code class=\"notranslate\">--pod</code> mode.</p>\n<h3 dir=\"auto\">Authentication</h3>\n<p dir=\"auto\">In order to mimic an attacker in it's early stages, kube-hunter requires no authentication for the hunt.</p>\n<ul dir=\"auto\">\n<li>\n<p dir=\"auto\"><strong>Impersonate</strong> - You can provide kube-hunter with a specific service account token to use when hunting by manually passing the JWT Bearer token of the service-account secret with the <code class=\"notranslate\">--service-account-token</code> flag.</p>\n<p dir=\"auto\">Example:</p>\n<div class=\"highlight highlight-source-shell notranslate position-relative overflow-auto\" dir=\"auto\" data-snippet-clipboard-copy-content=\"$ kube-hunter --active --service-account-token eyJhbGciOiJSUzI1Ni...\"><pre class=\"notranslate\">$ kube-hunter --active --service-account-token eyJhbGciOiJSUzI1Ni...</pre></div>\n</li>\n<li>\n<p dir=\"auto\">When runing with <code class=\"notranslate\">--pod</code> flag, kube-hunter uses the service account token <a href=\"https://kubernetes.io/docs/reference/access-authn-authz/service-accounts-admin/\" rel=\"nofollow\">mounted inside the pod</a> to authenticate to services it finds during the hunt.</p>\n<ul dir=\"auto\">\n<li>if specified, <code class=\"notranslate\">--service-account-token</code> flag takes priority when running as a pod</li>\n</ul>\n</li>\n</ul>\n<h3 dir=\"auto\">Active Hunting</h3>\n<p dir=\"auto\">Active hunting is an option in which kube-hunter will exploit vulnerabilities it finds, to explore for further vulnerabilities.<br>\nThe main difference between normal and active hunting is that a normal hunt will never change the state of the cluster, while active hunting can potentially do state-changing operations on the cluster, <strong>which could be harmful</strong>.</p>\n<p dir=\"auto\">By default, kube-hunter does not do active hunting. To active hunt a cluster, use the <code class=\"notranslate\">--active</code> flag. Example:<br>\n<code class=\"notranslate\">kube-hunter --remote some.domain.com --active</code></p>\n<h3 dir=\"auto\">List of tests</h3>\n<p dir=\"auto\">You can see the list of tests with the <code class=\"notranslate\">--list</code> option: Example:<br>\n<code class=\"notranslate\">kube-hunter --list</code></p>\n<p dir=\"auto\">To see active hunting tests as well as passive:<br>\n<code class=\"notranslate\">kube-hunter --list --active</code></p>\n<h3 dir=\"auto\">Nodes Mapping</h3>\n<p dir=\"auto\">To see only a mapping of your nodes network, run with <code class=\"notranslate\">--mapping</code> option. Example:<br>\n<code class=\"notranslate\">kube-hunter --cidr 192.168.0.0/24 --mapping</code><br>\nThis will output all the Kubernetes nodes kube-hunter has found.</p>\n<h3 dir=\"auto\">Output</h3>\n<p dir=\"auto\">To control logging, you can specify a log level, using the <code class=\"notranslate\">--log</code> option. Example:<br>\n<code class=\"notranslate\">kube-hunter --active --log WARNING</code><br>\nAvailable log levels are:</p>\n<ul dir=\"auto\">\n<li>DEBUG</li>\n<li>INFO (default)</li>\n<li>WARNING</li>\n</ul>\n<h3 dir=\"auto\">Dispatching</h3>\n<p dir=\"auto\">By default, the report will be dispatched to <code class=\"notranslate\">stdout</code>, but you can specify different methods by using the <code class=\"notranslate\">--dispatch</code> option. Example:<br>\n<code class=\"notranslate\">kube-hunter --report json --dispatch http</code><br>\nAvailable dispatch methods are:</p>\n<ul dir=\"auto\">\n<li>stdout (default)</li>\n<li>http (to configure, set the following environment variables:)\n<ul dir=\"auto\">\n<li>KUBEHUNTER_HTTP_DISPATCH_URL (defaults to: <a href=\"https://localhost\" rel=\"nofollow\">https://localhost</a>)</li>\n<li>KUBEHUNTER_HTTP_DISPATCH_METHOD (defaults to: POST)</li>\n</ul>\n</li>\n</ul>\n<h2 dir=\"auto\">Advanced Usage</h2>\n<h3 dir=\"auto\">Azure Quick Scanning</h3>\n<p dir=\"auto\">When running <strong>as a Pod in an Azure or AWS environment</strong>, kube-hunter will fetch subnets from the Instance Metadata Service. Naturally this makes the discovery process take longer.<br>\nTo hardlimit subnet scanning to a <code class=\"notranslate\">/24</code> CIDR, use the <code class=\"notranslate\">--quick</code> option.</p>\n<h3 dir=\"auto\">Custom Hunting</h3>\n<p dir=\"auto\">Custom hunting enables advanced users to have control over what hunters gets registered at the start of a hunt.<br>\n<strong>If you know what you are doing</strong>, this can help if you want to adjust kube-hunter's hunting and discovery process for your needs.</p>\n<p dir=\"auto\">Example:</p>\n<div class=\"snippet-clipboard-content notranslate position-relative overflow-auto\" data-snippet-clipboard-copy-content=\"kube-hunter --custom &lt;HunterName1&gt; &lt;HunterName2&gt;\"><pre class=\"notranslate\"><code class=\"notranslate\">kube-hunter --custom &lt;HunterName1&gt; &lt;HunterName2&gt;\n</code></pre></div>\n<p dir=\"auto\">Enabling Custom hunting removes all hunters from the hunting process, except the given whitelisted hunters.</p>\n<p dir=\"auto\">The <code class=\"notranslate\">--custom</code> flag reads a list of hunters class names, in order to view all of kube-hunter's class names, you can combine the flag <code class=\"notranslate\">--raw-hunter-names</code> with the <code class=\"notranslate\">--list</code> flag.</p>\n<p dir=\"auto\">Example:</p>\n<div class=\"snippet-clipboard-content notranslate position-relative overflow-auto\" data-snippet-clipboard-copy-content=\"kube-hunter --active --list --raw-hunter-names\"><pre class=\"notranslate\"><code class=\"notranslate\">kube-hunter --active --list --raw-hunter-names\n</code></pre></div>\n<p dir=\"auto\"><strong>Notice</strong>: Due to kube-huner's architectural design, the following \"Core Hunters/Classes\" will always register (even when using custom hunting):</p>\n<ul dir=\"auto\">\n<li>HostDiscovery\n<ul dir=\"auto\">\n<li><em>Generates ip addresses for the hunt by given configurations</em></li>\n<li><em>Automatically discovers subnets using cloud Metadata APIs</em></li>\n</ul>\n</li>\n<li>FromPodHostDiscovery\n<ul dir=\"auto\">\n<li><em>Auto discover attack surface ip addresses for the hunt by using Pod based environment techniques</em></li>\n<li><em>Automatically discovers subnets using cloud Metadata APIs</em></li>\n</ul>\n</li>\n<li>PortDiscovery\n<ul dir=\"auto\">\n<li><em>Port scanning given ip addresses for known kubernetes services ports</em></li>\n</ul>\n</li>\n<li>Collector\n<ul dir=\"auto\">\n<li><em>Collects discovered vulnerabilities and open services for future report</em></li>\n</ul>\n</li>\n<li>StartedInfo\n<ul dir=\"auto\">\n<li><em>Prints the start message</em></li>\n</ul>\n</li>\n<li>SendFullReport\n<ul dir=\"auto\">\n<li><em>Dispatching the report based on given configurations</em></li>\n</ul>\n</li>\n</ul>\n<h2 dir=\"auto\">Deployment</h2>\n<p dir=\"auto\">There are three methods for deploying kube-hunter:</p>\n<h3 dir=\"auto\">On Machine</h3>\n<p dir=\"auto\">You can run kube-hunter directly on your machine.</p>\n<h4 dir=\"auto\">Prerequisites</h4>\n<p dir=\"auto\">You will need the following installed:</p>\n<ul dir=\"auto\">\n<li>python 3.x</li>\n<li>pip</li>\n</ul>\n<h5 dir=\"auto\">Install with pip</h5>\n<p dir=\"auto\">Install:</p>\n<div class=\"snippet-clipboard-content notranslate position-relative overflow-auto\" data-snippet-clipboard-copy-content=\"pip install kube-hunter\"><pre class=\"notranslate\"><code class=\"notranslate\">pip install kube-hunter\n</code></pre></div>\n<p dir=\"auto\">Run:</p>\n<div class=\"snippet-clipboard-content notranslate position-relative overflow-auto\" data-snippet-clipboard-copy-content=\"kube-hunter\"><pre class=\"notranslate\"><code class=\"notranslate\">kube-hunter\n</code></pre></div>\n<h5 dir=\"auto\">Run from source</h5>\n<p dir=\"auto\">Clone the repository:</p>\n<div class=\"snippet-clipboard-content notranslate position-relative overflow-auto\" data-snippet-clipboard-copy-content=\"git clone https://github.com/aquasecurity/kube-hunter.git\"><pre class=\"notranslate\"><code class=\"notranslate\">git clone https://github.com/aquasecurity/kube-hunter.git\n</code></pre></div>\n<p dir=\"auto\">Install module dependencies. (You may prefer to do this within a <a href=\"https://packaging.python.org/guides/installing-using-pip-and-virtual-environments/\" rel=\"nofollow\">Virtual Environment</a>)</p>\n<div class=\"snippet-clipboard-content notranslate position-relative overflow-auto\" data-snippet-clipboard-copy-content=\"cd ./kube-hunter\npip install -r requirements.txt\"><pre class=\"notranslate\"><code class=\"notranslate\">cd ./kube-hunter\npip install -r requirements.txt\n</code></pre></div>\n<p dir=\"auto\">Run:</p>\n<div class=\"snippet-clipboard-content notranslate position-relative overflow-auto\" data-snippet-clipboard-copy-content=\"python3 kube_hunter\"><pre class=\"notranslate\"><code class=\"notranslate\">python3 kube_hunter\n</code></pre></div>\n<p dir=\"auto\"><em>If you want to use pyinstaller/py2exe you need to first run the install_imports.py script.</em></p>\n<h3 dir=\"auto\">Container</h3>\n<p dir=\"auto\">Aqua Security maintains a containerized version of kube-hunter at <code class=\"notranslate\">aquasec/kube-hunter:aqua</code>. This container includes this source code, plus an additional (closed source) reporting plugin for uploading results into a report that can be viewed at <a href=\"https://kube-hunter.aquasec.com\" rel=\"nofollow\">kube-hunter.aquasec.com</a>. Please note, that running the <code class=\"notranslate\">aquasec/kube-hunter</code> container and uploading reports data are subject to additional <a href=\"https://kube-hunter.aquasec.com/eula.html\" rel=\"nofollow\">terms and conditions</a>.</p>\n<p dir=\"auto\">The Dockerfile in this repository allows you to build a containerized version without the reporting plugin.</p>\n<p dir=\"auto\">If you run kube-hunter container with the host network, it will be able to probe all the interfaces on the host:</p>\n<p dir=\"auto\"><code class=\"notranslate\">docker run -it --rm --network host aquasec/kube-hunter</code></p>\n<p dir=\"auto\"><em>Note for Docker for Mac/Windows:</em> Be aware that the \"host\" for Docker for Mac or Windows is the VM that Docker runs containers within. Therefore specifying <code class=\"notranslate\">--network host</code> allows kube-hunter access to the network interfaces of that VM, rather than those of your machine.<br>\nBy default, kube-hunter runs in interactive mode. You can also specify the scanning option with the parameters described above e.g.</p>\n<p dir=\"auto\"><code class=\"notranslate\">docker run --rm aquasec/kube-hunter --cidr 192.168.0.0/24</code></p>\n<h3 dir=\"auto\">Pod</h3>\n<p dir=\"auto\">This option lets you discover what running a malicious container can do/discover on your cluster. This gives a perspective on what an attacker could do if they were able to compromise a pod, perhaps through a software vulnerability. This may reveal significantly more vulnerabilities.</p>\n<p dir=\"auto\">The example <code class=\"notranslate\">job.yaml</code> file defines a Job that will run kube-hunter in a pod, using default Kubernetes pod access settings. (You may wish to modify this definition, for example to run as a non-root user, or to run in a different namespace.)</p>\n<ul dir=\"auto\">\n<li>Run the job with <code class=\"notranslate\">kubectl create -f ./job.yaml</code></li>\n<li>Find the pod name with <code class=\"notranslate\">kubectl describe job kube-hunter</code></li>\n<li>View the test results with <code class=\"notranslate\">kubectl logs &lt;pod name&gt;</code></li>\n</ul>\n<h2 dir=\"auto\">Contribution</h2>\n<p dir=\"auto\">To read the contribution guidelines, <a href=\"https://github.com/aquasecurity/kube-hunter/blob/main/CONTRIBUTING.md\"> Click here </a></p>\n<h2 dir=\"auto\">License</h2>\n<p dir=\"auto\">This repository is available under the <a href=\"https://github.com/aquasecurity/kube-hunter/blob/main/LICENSE\">Apache License 2.0</a>.</p>","updatedAt":"2025-05-21T16:08:18Z","upvoteCount":null,"author":{"login":"eryajf","avatarUrl":"https://avatars.githubusercontent.com/u/33259379?u=e4a4090a38ac2473aaed4ef9945233636776c6c3&v=4","url":"https://github.com/eryajf"},"category":null,"labels":{"edges":[{"node":{"name":"更多","color":"25B472"}},{"node":{"name":"K8S-Tools","color":"2d411a"}},{"node":{"name":"aquasecurity","color":"3d5803"}}]},"comments":{"edges":[]}}},"pageContext":{"number":321,"previous":{"title":"kubegems/kubegems: 围绕 K8s 通过自研和集成云原生项目而构建的通用性开源 PaaS 云管理平台, 支持多集群多租户","number":320},"next":{"title":"caicloud/kube-ladder: 文档旨在为广大从业者提供一个 Kubernetes 学习路径，为大家提供一定的指引","number":322}}},
    "staticQueryHashes": ["151096407","2861350382"]}