aquasecurity / kube-hunter

Hunt for security weaknesses in Kubernetes clusters
Apache License 2.0
4.66k stars 579 forks source link

Proving system logs outputs misleading evidence #408

Closed danielsagi closed 3 years ago

danielsagi commented 3 years ago

When the /logs endpoint is exposed, and an active scan is running, we try to parse the file /var/log/audit/audit.log This file down not necessarily exist. for now we at least need to specify that we did not manage to prove this in the evidence.

Next step is implementing another way of proving this in a more versatile way