🔍 Comprehensive Scanning
Scan live Kubernetes clusters, YAML manifests, and Helm charts for security vulnerabilities and misconfigurations using CEL-based rules.
🔍 Comprehensive Scanning
Scan live Kubernetes clusters, YAML manifests, and Helm charts for security vulnerabilities and misconfigurations using CEL-based rules.
⚡ High Performance
Built with Go for speed and efficiency. Concurrent scanning with configurable workers and intelligent caching for optimal performance.
🛡️ 140+ Built-in Rules
Comprehensive security rules covering 10 major categories from workload security to compliance, with CIS Kubernetes Benchmark alignment.
🔧 Extensible
Create custom security rules using CEL (Common Expression Language). Easy rule development with YAML-based configuration.
📊 Multiple Output Formats
Support for table, JSON, YAML, and SARIF output formats. Perfect for CI/CD integration and security reporting.
🚀 Multiple Deployment Modes
Use as CLI tool, admission controller, or integrate into CI/CD pipelines. Docker images available for easy deployment.
Spotter covers 10 comprehensive security categories:
# Scan a live clusterspotter scan cluster
# Scan manifest filesspotter scan manifests ./k8s-manifests/
# Output in JSON formatspotter scan cluster --output json
# Scan with custom rulesspotter scan manifests --rules ./custom-rules/ ./manifests/