DevSecOps
Kubernetes Manifest Linter
Paste a Kubernetes Deployment, Pod, or similar manifest to check for common misconfigurations: missing resource limits, missing health probes, :latest image tags, and privileged containers. Checks run client-side โ your manifest is not transmitted.
No data is transmitted โ everything runs locallyTool
About this tool
Kubernetes Manifest Linter
The Kubernetes Manifest Linter checks YAML manifests for missing resource limits, missing health probes, :latest image tags, and privileged security contexts.
โข Review a manifest before deploying to production
โข Audit a team member's PR for K8s security issues
โข Generate evidence that manifests meet a security baseline
โข Catch :latest and privileged flags before a security review
Affiliate disclosure
Credential and secrets management for teams. 1Password provides enterprise password management and secrets infrastructure for development teams.
View secrets with 1Password
External site ยท Independent provider ยท We may receive a commission ยท Not a recommendation
FAQ
What does this tool tell you?
The Kubernetes Manifest Linter checks YAML manifests for missing resource limits, missing health probes, :latest image tags, and privileged security contexts.
What affects the result most?
Image tag :latest (non-deterministic builds). securityContext.privileged: true (host kernel access). Missing resources.limits (unbounded resource use).
How should I use the result?
Treat the tool's output as a first-pass check, not a proof of correctness. A clean pass means no issues in the patterns this tool recognizes; a failure points to a specific problem you can investigate in your source. The underlying spec is the authoritative source for edge cases.
Related tools