Skip to content

Commit be60afc

Browse files
authored
Added release and license images
1 parent ad55e1c commit be60afc

File tree

1 file changed

+9
-0
lines changed

1 file changed

+9
-0
lines changed

README.md

+9
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
1+
[![GitHub release][release-img]][release]
2+
[![License][license-img]][license]
3+
14
<img src="https://github.com/cyberark/KubiScan/blob/assets/kubiscan_logo.png" width="260">
25
A tool for scanning Kubernetes cluster for risky permissions in Kubernetes's Role-based access control (RBAC) authorization model.
36
The tool was published as part of the "Securing Kubernetes Clusters by Eliminating Risky Permissions" research https://www.cyberark.com/threat-research-blog/securing-kubernetes-clusters-by-eliminating-risky-permissions/.
@@ -138,3 +141,9 @@ We added all the roles we found to be risky, but because each one can define the
138141

139142
## References:
140143
For more comments, suggestions or questions, you can contact Eviatar Gerzi ([@g3rzi](https://twitter.com/g3rzi)) and CyberArk Labs.
144+
145+
[release-img]: https://img.shields.io/github/release/cyberark/kubiscan.svg
146+
[release]: https://github.com/cyberark/kubiscan/releases
147+
148+
[license-img]: https://img.shields.io/github/license/cyberark/kubiscan.svg
149+
[license]: https://github.com/cyberark/kubiscan/blob/master/LICENSE

0 commit comments

Comments
 (0)