Skip to content

Scan all Kubeflow pipelines for exposed secrets

License

GPL-2.0, Unknown licenses found

Licenses found

GPL-2.0
LICENSE
Unknown
COPYING
Notifications You must be signed in to change notification settings

StatCan/aaw-kubeflow-pipelines-secret-scanner

Repository files navigation

kfp-secret-scanner

Scan for Kubeflow pipelines secrets.

How to use it

  1. Push the app to $REGISTRY/kfp-secret-scanner:$VERSION
  2. Configure the chart/values.yaml file accordingly
  3. Create the elastic-creds secret using create-elk-secret.sh (it will prompt you)
  4. Deploy the helm chart as you please, adding the imagePullSecret and namespace, probably.
  5. If you want, trigger a manual run with ./manual-run.sh -n $NAMESPACE

Then voila! Check kibana.

Screenshot Alerts

Attribution

The secret scanner borrows from Trufflehog, and the code and inspiration for scraping the kubeflow pipelines API came from @wg102's repo.

About

Scan all Kubeflow pipelines for exposed secrets

Topics

Resources

License

GPL-2.0, Unknown licenses found

Licenses found

GPL-2.0
LICENSE
Unknown
COPYING

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published