Discover and deploy CEL-based security policies for Kubernetes. Protect your infrastructure with community-driven rules.
spotter-access-001
spotter-access-002
spotter-access-003
spotter-audit-001
spotter-config-001
spotter-config-002
spotter-config-003
spotter-config-004
spotter-config-005
spotter-config-006
spotter-config-007
spotter-config-008
spotter-config-009
spotter-data-001
spotter-data-002
service-type-is-nodeport
spotter-network-002
spotter-platform-001
spotter-platform-002
spotter-supply-001
spotter-supply-002
spotter-supply-003
spotter-supply-004
spotter-workload-001
spotter-workload-002
spotter-workload-003
spotter-workload-004
spotter-workload-005
spotter-workload-006
spotter-workload-007
spotter-workload-008
spotter-workload-009
spotter-workload-010
spotter-workload-011
spotter-workload-012
spotter-workload-013
spotter-workload-014