Latest version: v0.2.0
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Generate Kubernetes architecture diagrams from Kubernetes manifest files, kustomization files, Helm charts, and actual cluster state
No known vulnerabilities found