Kubescape is an open-source Kubernetes security platform. It scans clusters, manifests, and container images for misconfigurations and vulnerabilities. You can run it as a CLI tool or deploy it as an in-cluster operator.
ARMO created Kubescape and donated it to the CNCF, where it sits as an incubating project. 11.1k GitHub stars, 894 forks. More than 25,000 organizations run it, including Intel, AWS, and Bitnami.
What is Kubescape?
It started life as a misconfiguration scanner. Now it validates configurations against CIS Benchmarks, NSA-CISA hardening guidance, and the MITRE ATT&CK framework for containers — plus image scanning, runtime detection, and network policy generation.
fix command corrects misconfigurations in YAML files. The vap command generates Validating Admission Policies to block non-compliant resources at deploy time.Key features
| Feature | Details |
|---|---|
| Compliance frameworks | CIS Kubernetes Benchmark, NSA-CISA, MITRE ATT&CK, SOC 2 |
| Policy engine | Open Policy Agent (OPA) with Rego controls from public Regolibrary |
| Image scanning | Grype-based CVE detection in base images and dependencies |
| Image patching | Copacetic rebuilds images with updated packages without changing the application layer |
| Runtime monitoring | eBPF via Inspektor Gadget — watches system calls, network connections, file access |
| Network policies | Observes real traffic patterns and generates least-privilege NetworkPolicy resources |
| Risk scoring | 0–100 per control, with severity threshold flags for CI/CD gating |
| Output formats | Pretty-printed tables, JSON, JUnit XML, SARIF, HTML, PDF |
| IDE support | VS Code, Lens |
| CI/CD integrations | GitHub Actions, GitLab CI, Jenkins, CircleCI, pre-commit hooks |
Architecture
Kubescape runs in two modes. The CLI is a standalone binary for pre-deployment scanning. The operator is a Helm-deployed set of microservices for continuous in-cluster monitoring.

Open Policy Agent runs the policy engine. Controls are written in Rego and live in a public repo called Regolibrary. After the first run, the CLI caches controls locally — scans work offline from that point.
Operator components
The operator has four main pieces:
- kubescape — misconfiguration scanning (same engine as the CLI)
- kubevuln — image vulnerability scanning using Grype
- storage — exposes scan data as Kubernetes API objects
- synchronizer — exports data to external providers
An optional node agent DaemonSet deploys to every node for host scanning and runtime vulnerability relevancy calculations.

Image scanning and patching
Image scanning wraps Grype to find CVEs in base images and dependencies. Each scan produces an SBOM and maps vulnerabilities to specific packages.
Copacetic handles automatic patching: it rebuilds images with updated packages without touching the application layer. Run kubescape patch to patch a vulnerable image directly.
Network policy generation
Network policy generation watches real traffic patterns in your cluster and recommends NetworkPolicy resources for least-privilege segmentation. If you’ve ever tried writing network policies by hand, you know why this matters.
Compliance and output
Supported frameworks: CIS Kubernetes Benchmark (multiple versions), NSA-CISA, MITRE ATT&CK for containers, and SOC 2. Custom frameworks can be defined using Rego.
Each control gets a risk score from 0 to 100. The CLI supports namespace filtering with --include-namespaces and --exclude-namespaces, exception rules for risk acceptance, and a severity threshold flag that fails the scan when the score gets too high.
IDE integration
The VS Code extension scans YAML files in the editor and shows findings in the Problems tab. Frameworks download locally for offline scanning. Scans trigger automatically on file save by default.

Integrations
Getting started
curl -s https://raw.githubusercontent.com/kubescape/kubescape/master/install.sh | /bin/bash or use Homebrew, Krew, Chocolatey, or Scoop.kubescape scan against your current kubeconfig context. Add framework nsa or framework cis-v1.23 to target a specific standard.--format json --output results.json for machine-readable output, or --format sarif for GitHub code scanning.helm install kubescape kubescape/kubescape-operator -n kubescape --create-namespace for continuous scanning, runtime detection, and network policy generation.When to use Kubescape
Kubescape fits teams whose security concerns center on Kubernetes. Misconfigurations, image vulnerabilities, runtime threats, compliance — it handles all of these in one open-source tool.
Pick it when you need compliance validation against CIS, NSA-CISA, or MITRE ATT&CK. The in-cluster operator is worth deploying if you want continuous monitoring beyond pre-deployment checks.
For a broader view of Kubernetes security strategy, see our cloud infrastructure security guide. For broader IaC security coverage that includes Terraform and CloudFormation, pair Kubescape with Checkov or Terrascan. If you want a commercial platform with enterprise support, Snyk IaC offers similar Kubernetes scanning inside a larger security suite.
