From be60afcdf0b1dc36b40bf4d861b210cebf59a5c8 Mon Sep 17 00:00:00 2001 From: Eviatar Gerzi Date: Wed, 24 Jul 2019 10:03:10 +0300 Subject: [PATCH] Added release and license images --- README.md | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/README.md b/README.md index 618b9a2..5df8520 100644 --- a/README.md +++ b/README.md @@ -1,3 +1,6 @@ +[![GitHub release][release-img]][release] +[![License][license-img]][license] + A tool for scanning Kubernetes cluster for risky permissions in Kubernetes's Role-based access control (RBAC) authorization model. The tool was published as part of the "Securing Kubernetes Clusters by Eliminating Risky Permissions" research https://www.cyberark.com/threat-research-blog/securing-kubernetes-clusters-by-eliminating-risky-permissions/. @@ -138,3 +141,9 @@ We added all the roles we found to be risky, but because each one can define the ## References: For more comments, suggestions or questions, you can contact Eviatar Gerzi ([@g3rzi](https://twitter.com/g3rzi)) and CyberArk Labs. + +[release-img]: https://img.shields.io/github/release/cyberark/kubiscan.svg +[release]: https://github.com/cyberark/kubiscan/releases + +[license-img]: https://img.shields.io/github/license/cyberark/kubiscan.svg +[license]: https://github.com/cyberark/kubiscan/blob/master/LICENSE