This is an educational resource designed to demonstrate various application and platform vulnerabilities within Kubernetes, as well as provide an opportunity to practice different hacking techniques.
This contains applications with a built-in security vulnerabilities. Please don’t deploy the Helm charts into a production environment. There are also instructions showing how to exploit different application and platform vulnerabilities, so please don’t use this to break any laws :grin:.
You can add the Helm repository locally by running the below command:
helm repo add kube-hack https://kube-hack.github.io/charts
helm repo update
If you would like to see the available charts in the kube-hack
repository, run the below command:
helm search repo kube-hack
Linked below are repositories containing source code and walkthroughs for each vulnerability. Each will include an introductory README.md
file and a solution
directory. If you would prefer to practice hacking an application without knowing too many details, follow the installation instructions in the root README.md
file, and don’t read the files in the solution
directory.
More coming soon!
Create a public Github repository with a directory named chart
containing the Helm chart files (see the linked repositories for examples)
Fork the kube-hack/charts
repository and clone it to your computer. If you want to test the newly-added files on your fork, you’ll need to configure your Github repository to answer GET requests for YAML
and tar
files. See Helm’s Chart Repository Guide for more details.
go run main.go https://github.com/example-owner/example-repo-1 https://github.com/example-owner/example-repo-2
kube-hack/charts
repo. We will review the code and determine if the chart is a meaningful addition to the project.