topcug/k8s-runtime-replay
GitHub: topcug/k8s-runtime-replay
通过在本地 kind 集群中触发可重现的 Kubernetes 运行时行为,帮助安全团队验证 Falco 等检测工具的规则覆盖和告警有效性。
Stars: 0 | Forks: 0
# k8s-runtime-replay
# remove a specific scenario
make cleanup # delete the k8s-replay namespace
make reset # full teardown including kind cluster
# 工具
make list-scenarios # list available scenarios
make logs-falco # filtered Falco alert log view
make logs-falco-raw # raw recent Falco logs (useful for format debugging)
make list-rules # attempt to infer loaded Falco rule names (best-effort)
```
## 场景结构
每个场景遵循相同的布局:
```
scenarios//
README.md — goal, what gets deployed, what is triggered,
expected behavior, detection notes, known rule-name variants,
cleanup, safety notes
manifests/ — Kubernetes YAML (namespace, workload, RBAC)
trigger.sh — deploys and triggers the behavior
cleanup.sh — removes all scenario resources
```
## 可选:使用 Falco 测试
Falco 不是必需的 — 场景可以通过 `kubectl` 和审计日志运行和观察。但如果您想验证运行时规则命中:
```
make setup-falco
make scenario-shell-spawn
# 在第二个终端中
make logs-falco
# 如果没有告警出现,请检查原始日志的格式问题
make logs-falco-raw
```
有关完整的 Falco 设置说明,请参阅 [docs/falco-setup.md](docs/falco-setup.md)。
## 文档
- [docs/local-cluster.md](docs/local-cluster.md) — 设置本地 kind 集群
- [docs/falco-setup.md](docs/falco-setup.md) — 安装和验证 Falco
- [docs/workshop-mode.md](docs/workshop-mode.md) — 作为结构化研讨会运行
## 路线图
- [x] v0.1 — 5 个核心场景(shell-spawn、sa-token-read、kubectl-exec、curl-egress、secret-enumeration)
- [ ] v0.2 — `privileged-start` 场景
- [ ] v0.3 — 每个场景的 `verify.sh`(自动化信号验证)
- [ ] v0.4 — 每个场景的 asciinema 录制
- [ ] v1.0 — Falco 规则映射表,MITRE ATT&CK 标注
## 许可证
Apache 2.0 — 请参阅 [LICENSE](LICENSE)
标签:AMSI绕过, Cutter, DevSecOps, Docker, EDR, Falco, HTTP工具, K8s审计, kind, Web截图, 上游代理, 威胁检测, 子域名突变, 安全测试, 安全研讨会, 安全运营, 安全防御评估, 审计日志, 容器安全, 容器编排安全, 恶意行为模拟, 扫描框架, 攻击性安全, 敏感词过滤, 无线安全, 网络安全审计, 脆弱性评估, 规则验证, 请求拦截