KubeArmor
Runtime Security Enforcement System. Workload hardening/sandboxing and implementing least-permissive policies made easy leveraging LSMs (LSM-BPF, AppArmor).
Install / Use
/learn @kubearmor/KubeArmorREADME

KubeArmor is a cloud-native runtime security enforcement system that restricts the behavior (such as process execution, file access, and networking operations) of pods, containers, and nodes (VMs) at the system level.
KubeArmor leverages Linux security modules (LSMs) such as AppArmor, SELinux, or BPF-LSM to enforce the user-specified policies. KubeArmor generates rich alerts/telemetry events with container/pod/namespace identities by leveraging eBPF.
| | | |:---|:---| | :muscle: Harden Infrastructure <hr>:chains: Protect critical paths such as cert bundles <br>:clipboard: MITRE, STIGs, CIS based rules <br>:left_luggage: Restrict access to raw DB table | :ring: Least Permissive Access <hr>:traffic_light: Process Whitelisting <br>:traffic_light: Network Whitelisting <br>:control_knobs: Control access to sensitive assets | | :telescope: Application Behavior <hr>:dna: Process execs, File System accesses <br>:compass: Service binds, Ingress, Egress connections <br>:microscope: Sensitive system call profiling | :snowflake: Deployment Models <hr>:wheel_of_dharma: Kubernetes Deployment<br>:whale2: Containerized Deployment<br>:computer: VM/Bare-Metal Deployment |
Architecture Overview

Documentation :notebook:
- :point_right: Getting Started
- :dart: Use Cases
- :heavy_check_mark: KubeArmor Support Matrix
- :chess_pawn: How is KubeArmor different?
- :scroll: Security Policy for Pods/Containers [Spec] [Examples]
- :scroll: Cluster level security Policy for Pods/Containers [Spec] [Examples]
- :scroll: Security Policy for Hosts/Nodes [Spec] [Examples]
- :scroll: Network Security Policy for Hosts/Nodes [Spec] [Examples]<br> ... detailed documentation
Contributors :busts_in_silhouette:
- :blue_book: Contribution Guide
- :technologist: Development Guide, Testing Guide
- :raised_hand: Join KubeArmor Slack
- :question: FAQs
Biweekly Meeting
- :speaking_head: Zoom Link
- :page_facing_up: Minutes: Document
- :calendar: Calendar invite: Google Calendar, ICS file
Notice/Credits :handshake:
- KubeArmor uses Tracee's system call utility functions.
CNCF
KubeArmor is Sandbox Project of the Cloud Native Computing Foundation.

ROADMAP
KubeArmor roadmap is tracked via KubeArmor Projects
Related Skills
healthcheck
325.9kHost security hardening and risk-tolerance configuration for OpenClaw deployments
node-connect
325.9kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
prose
325.9kOpenProse VM skill pack. Activate on any `prose` command, .prose files, or OpenProse mentions; orchestrates multi-agent workflows.
frontend-design
80.3kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
