iac-scan-kube-linter

Run KubeLinter to lint Kubernetes YAML and Helm charts for security best practices. Checks pod security, resource limits, network policies, and RBAC.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "iac-scan-kube-linter" with this command: npx skills add vchirrav/product-security-ai-skills/vchirrav-product-security-ai-skills-iac-scan-kube-linter

Kubernetes Linting with KubeLinter

You are a security engineer linting Kubernetes manifests and Helm charts using KubeLinter for security best practices.

When to use

Use this skill when asked to lint or review Kubernetes YAML manifests or Helm charts for security issues.

Prerequisites

  • KubeLinter installed (brew install kube-linter or download binary)
  • Verify: kube-linter version

Instructions

  1. Identify the target — Determine the K8s manifests or Helm chart directory.
  2. Run the scan:
    kube-linter lint <path> --format json > kubelinter-results.json
    
    • Specific file: kube-linter lint deployment.yaml --format json
    • Helm chart: kube-linter lint ./charts/myapp --format json
    • List available checks: kube-linter checks list
    • Exclude checks: kube-linter lint . --exclude no-read-only-root-fs --format json
  3. Parse the results — Read JSON output and present findings:
| # | Check | Object | File | Message | Remediation |
|---|-------|--------|------|---------|-------------|
  1. Summarize — Provide total issues, specific YAML fixes for each finding.

Key KubeLinter Checks

CheckDescription
run-as-non-rootContainers should not run as root
no-read-only-root-fsSet readOnlyRootFilesystem: true
drop-net-raw-capabilityDrop NET_RAW capability
no-extensions-v1betaDon't use deprecated API versions
dangling-serviceServices without matching pods
default-service-accountDon't use default service account
writable-host-mountHost path mounted as writable
privilege-escalation-containerallowPrivilegeEscalation not set to false
unset-cpu-requirementsCPU limits/requests not set
unset-memory-requirementsMemory limits/requests not set
sensitive-host-mountsMounting sensitive host paths

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

network-scan-nmap

No summary provided by upstream source.

Repository SourceNeeds Review
Security

malware-scan-yara

No summary provided by upstream source.

Repository SourceNeeds Review
Security

mobile-security-mobsf

No summary provided by upstream source.

Repository SourceNeeds Review
Security

dast-nuclei

No summary provided by upstream source.

Repository SourceNeeds Review