Title:Kubernetes Potential Enumeration Activity Status:experimental Description:Detects potential Kubernetes enumeration or attack activity via the audit log.
This includes the execution of common shells, utilities, or specialized tools like 'Rakkess' (access_matrix) and 'TruffleHog' via Kubernetes API requests.
Attackers use these methods to perform reconnaissance (enumeration), secret harvesting, or execute code (exec) within a cluster.
References: -https://www.nccgroup.com/research/detection-engineering-for-kubernetes-clusters/ -https://github.com/trufflesecurity/trufflehog -https://github.com/corneliusweig/rakkess Author: uniqu3-us3r Date: 2026-04-28 modified:None Tags:
condition:selection_status and 1 of selection_request_* Falsepositives:
-Authorized administrative maintenance via kubectl
-Automated internal infrastructure monitoring and certificate rotation
-Security-approved vulnerability or secret scanning in DevSecOps pipelines Level:medium