If you believe you have found a security issue, please open a private issue or contact the maintainers directly.
- Secret values are never returned. Secret
dataandstringDataare redacted. - Token-like strings are redacted from outputs and logs.
- Audit logs are structured JSON and include tool name, user ID, namespaces/resources, and outcome.
- ConfigMap values are returned as-is unless they match token-like patterns.
RootCause uses your kubeconfig identity in this version; local API-key auth is not enabled.
--read-onlyremoves all write and exec tools from discovery.--disable-destructiveremoves delete and risky write tools unless allowlisted.
- Namespace-scoped users can access only their allowed namespaces; cluster-scoped resources are blocked.
- Some diagnostics (node metrics, StorageClass/PV/VolumeAttachment, NodeClaims) require cluster role permissions.
k8s.execand write tools require explicit confirmation and should be restricted in shared environments.