KubernetesSecurity.Visualized.
npm install -g k8s-avUnderstand how attackers move through your cluster — not just where vulnerabilities exist.
MAPPING YOUR CLUSTER
VECTORNETES ingests your kubeconfig and indexes every resource in real time.
Four capabilities.
One unified graph.
Attack Path Discovery
BFS graph traversal from every entry point to every crown jewel — ranked by exploitability.
RBAC Relationship Mapping
Every ServiceAccount, Role, and binding as navigable edges. Find wildcard permissions instantly.
CVE Enrichment
Running image SHAs matched against NVD and OSV databases. Vulnerabilities anchored to nodes.
Crown Jewel Detection
Automatically identify Secrets, ConfigMaps, and database pods representing the highest-value targets.
Map your attack surface.
Before they do.
Connect your kubeconfig. Get a full attack graph in under 60 seconds. No agent. No data exfiltration. Free forever.
From cluster to attack graph in three steps.
Connect
Point VECTORNETES at your kubeconfig. Read-only. No data leaves your cluster.
< 30 secondsScan
BFS + Dijkstra find all attack paths in under 60 seconds.
< 60 secondsSecure
Kill Chain reports. Know exactly what to patch first.
Instant