
Security News
Open VSX Begins Implementing Pre-Publish Security Checks After Repeated Supply Chain Incidents
Following multiple malicious extension incidents, Open VSX outlines new safeguards designed to catch risky uploads earlier.
www.github.com/sn0rlaxlife/paranoia.git
Advanced tools
Project Paranoia is a kubernetes security posture management tool in development by sn0rlaxlife

This project serves as a kubernetes security posture management tool written in Go, this uses the kubernetes native client to initiate controls such as validation across your cluster on the following best practices. Like many users that are new to ecosystem of microservices this serves as a human-prevention tool on deploying misconfigurations, areas of concern, elevated privileges.
This project is still in experimental phase and only to be used for development operations use at your own risk.
./paranoia watch -w --watch-pods
./paranoia watch -w --watch-deployments
./paranoia watch -w --watch-secrets
./paranoia watch -w --watch-clusterroles
./paranoia report-html --kubeconfig <kube-config>
This centralizes the report in one visual for all checks in a one go round that allows you a risk-posture along with mapping a score report.
To leverage this tool in your cluster run the following commands.
git clone https://github.com/sn0rlaxlife/paranoia.git && cd paranoia
The Makefile checks if Trivy-operator is installed to run on CRD Checks Use of trivyoperator.sh (if this isn't installed run chmod +x trivyoperator.sh -> ./trivyoperator.sh
make build
Run a RBAC (Sanity check) by simply using the CLI syntax below
./paranoia rbac -b
Run a deployment check on labels in cluster to identify no labels on various deployments.
./paranoia deployment -c
Run checks to validate high valued roles are running and found in your cluster such as system:certificates.k8s.io, system:auth-delegator, system:aggregate-to-admin. This check will also run a scan on the Node to identify if HA is detected the default value for this is 3 nodes.
./paranoia check -c
Run a vulnerability report on a existing namespace this leverages the outbound to our trivy-operator and CRDs
./paranoia report --kubeconfig=<kube-config> -n <namespace>
kubectl access and a valid kubeconfig (or run in-cluster)make build
./paranoia watch -w --watch-pods
./paranoia watch -w --watch-deployments --watch-secrets --watch-clusterroles
./paranoia check
./paranoia deployment -d
./paranoia rbac -b
./paranoia report --kubeconfig=/path/to/kubeconfig -n <namespace>
./paranoia report-html --kubeconfig=/path/to/kubeconfig

The CLI needs permission to list/watch RBAC, Pods, Deployments, Secrets, and (optionally) read Trivy CRDs. For full visibility you will typically need elevated privileges (e.g., cluster-admin). Use caution when running in production clusters.
FAQs
Unknown package
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Following multiple malicious extension incidents, Open VSX outlines new safeguards designed to catch risky uploads earlier.

Research
/Security News
Threat actors compromised four oorzc Open VSX extensions with more than 22,000 downloads, pushing malicious versions that install a staged loader, evade Russian-locale systems, pull C2 from Solana memos, and steal macOS credentials and wallets.

Security News
Lodash 4.17.23 marks a security reset, with maintainers rebuilding governance and infrastructure to support long-term, sustainable maintenance.