Skip to content

Commit

Permalink
Added release and license images
Browse files Browse the repository at this point in the history
  • Loading branch information
g3rzi authored Jul 24, 2019
1 parent ad55e1c commit be60afc
Showing 1 changed file with 9 additions and 0 deletions.
9 changes: 9 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,6 @@
[![GitHub release][release-img]][release]
[![License][license-img]][license]

<img src="https://github.com/cyberark/KubiScan/blob/assets/kubiscan_logo.png" width="260">
A tool for scanning Kubernetes cluster for risky permissions in Kubernetes's Role-based access control (RBAC) authorization model.
The tool was published as part of the "Securing Kubernetes Clusters by Eliminating Risky Permissions" research https://www.cyberark.com/threat-research-blog/securing-kubernetes-clusters-by-eliminating-risky-permissions/.
Expand Down Expand Up @@ -138,3 +141,9 @@ We added all the roles we found to be risky, but because each one can define the

## References:
For more comments, suggestions or questions, you can contact Eviatar Gerzi ([@g3rzi](https://twitter.com/g3rzi)) and CyberArk Labs.

[release-img]: https://img.shields.io/github/release/cyberark/kubiscan.svg
[release]: https://github.com/cyberark/kubiscan/releases

[license-img]: https://img.shields.io/github/license/cyberark/kubiscan.svg
[license]: https://github.com/cyberark/kubiscan/blob/master/LICENSE

0 comments on commit be60afc

Please sign in to comment.