Huntress Acquires Inside Agent: A New Era for Identity ProtectionFree Trial
Menu
InvestorsCareersBlogAboutAcademySupportContact
LoginSign up
CLOUD RUNTIME VALIDATION · KUBERNETES SECURITY · CONTAINER ATTACK PATH TESTING

Cloud scanners find issues.Spakto proves which onesattackers can actually exploit.

Spakto continuously validates real attack paths across your cloud accounts, Kubernetes clusters, container workloads, IAM roles, and network policies — proving which misconfigurations lead to compromise, not just which ones exist.

What is Cloud Runtime Validation

CSPM shows misconfigs.
Spakto shows exploit paths.

A misconfigured S3 bucket alone is not a breach. It only becomes one when it chains into an IAM role, a metadata endpoint, and a cross-account pivot. Spakto validates the complete chain — safely, continuously, automatically.

CSPM / CNAPP View — Isolated FindingsNO CONTEXT
Public S3 Bucket
Credential file exposed
MED
IAM Role Overpermissioned
PassRole on * resource
HIGH
EC2 Metadata API
Instance profile credential fetch
HIGH
Cross-Account Pivot
AssumeRole into prod account
CRIT
4 Isolated FindingsNo Attack PathPriority Unclear
Spakto — Exploit Chain ViewCLICK NODE TO TRACE
4 Chained Findings1 Critical Exploit PathFull Chain Validated
AWS / GCP / Azure
Multi-Cloud Coverage
Kubernetes
Native K8s Attack Path Testing
Zero
Production Impact
Attack Coverage

Every cloud attack vector.
Continuously validated.

140+
Total Cloud Techniques
Cloud IAM & Role Abuse34 TECHNIQUES

Cross-account AssumeRole chaining, over-permissioned execution roles, and federated identity exploitation.

Attack Flow
ENTRY
Enumerate Roles
ListRoles / GetPolicy
PIVOT
PassRole Abuse
iam:PassRole on *
ESCALATE
Assume Admin Role
sts:AssumeRole chain
IMPACT
Full Account Access
Unrestricted API access
MITRE ATT&CK Techniques
T1078.004T1548.005T1098.001T1552.005+30 more
All 34 techniques continuously validated against live cloud config — zero production impact
Cloud Runtime Validation vs CSPM

Finding misconfigs is not
the same as proving exploitability.

CSPM tools report configuration deviations. Spakto validates whether those deviations can actually be chained by an attacker to reach a high-value target.

CSPM / CNAPP — Alert StreamNO EXPLOIT CONTEXT
RESOURCERULESEV
⚠ 47+ Open FindingsUnknown PriorityNo Chain Context
Spakto — Exploit Path TreeCLICK TO TRACE
Attacker EntryPublic S3 credential exposure
2 Impact PathsDB + Node Compromise
CapabilityCSPM / CNAPPSpakto Cloud Validation
Reports misconfigurations
Proves exploit path reachability
Chains multi-step attack paths
Runtime defense validation
Continuous adversarial testing
Prioritizes by actual exploitability
How Spakto Cloud Validation Works

From cloud config to
validated attack path.

Step 1 of 4

Ingest

Connect cloud accounts and clusters

  • Read-only API access — no write permissions required
  • Supports AWS, Azure, GCP via SDK-level authentication
  • Kubernetes clusters via kubeconfig or service account token
  • Container registries: ECR, GCR, ACR, Docker Hub
spakto — step-1-ingest
Environment Coverage

Every cloud. Every
runtime environment.

Spakto validates attack paths across all three major cloud providers — with native support for Kubernetes, serverless, IAM, secrets, and network configurations on each.

12
Services Covered
186
Attack Vectors
Continuous
Validation Cadence
Identity
IAM
Attack vectors34
Compute
EC2
Attack vectors22
Containers
EKS
Attack vectors28
Containers
ECS
Attack vectors14
Serverless
Lambda
Attack vectors16
Storage
S3
Attack vectors18
Database
RDS
Attack vectors9
Secrets
Secrets Manager
Attack vectors11
Secrets
SSM
Attack vectors8
Network
VPC
Attack vectors15
Network
API Gateway
Attack vectors7
Logging
CloudTrail
Attack vectors4
Kubernetes native — EKS, AKS, GKE, and self-managed clusters all supported. RBAC, network policies, pod security, and runtime configurations validated natively.
Who uses Cloud Runtime Validation

Built for teams who
own cloud security outcomes.

Whether you're validating exploit paths, shipping infrastructure, or reporting risk to the board — Spakto gives each team exactly what they need.

Cloud security engineers need to know exactly which misconfiguration chains create real risk — not theoretical CVSS scores. Spakto replaces the annual cloud pentest with always-on adversarial validation that updates every time your configuration changes.

94%
Reduction in false positives
3.4×
Faster remediation prioritization
100%
Coverage across cloud accounts
Continuous
vs quarterly pentest
  • Real-time exploit path inventory across all cloud accounts
  • Automatic re-validation when IAM or network config changes
  • Evidence artifacts for each validated attack step
  • Direct Terraform and IaC integration for shift-left coverage

We used to spend weeks triaging CSPM alerts. Now we see exactly which three paths matter.

Cloud Security Lead, Series C Fintech
KUBERNETES ATTACK PATH TRACER · LIVE CLUSTER ESCAPE SIMULATION

Every K8s misconfiguration
traced to cluster takeover.

Spakto maps how misconfigurations in pod specs, RBAC bindings, and service account permissions chain into node escape, API server compromise, and full cluster control — with the specific syscalls and API verbs at every hop.

k8s-cluster://prod-01 — attack path visualizer
pod-appPODnode-01NODEkubeletSVCSA:defaultSASA:ci-runnerSAClusterRoleRBACkube-apiserverAPIetcdDBSecretsDBAWS IAMCLOUD
Execution Steps
1
hostPath /proc writeCAP_SYS_ADMIN
2
kubelet socket abuseNode API
3
kubelet → API credsRBAC
4
secrets enumeratecluster-admin
IAM PRIVILEGE ESCALATION CHAIN ANALYZER · MULTI-CLOUD

From a single compute role
to full account takeover.

AssumeRole chains, managed identity abuse, and permission boundary bypass — the engine traces every multi-hop IAM path to administrator, with the exact API calls and policy documents that enable each step.

AWS
ENTRY POINT · COMPUTE
EC2 Instance (i-0a8f3b2c)
iam:GetInstanceProfile
InstanceProfile
ec2-ssm-role
sts:AssumeRole
sts:AssumeRole
ec2-ssm-role
iam:AttachRolePolicy
iam:AttachRolePolicy
dev-admin-role
ALL ACTIONS
AWS Root-equivalent
arn:aws:iam::aws:policy/AdministratorAccess
CRITICALFull AWS Account Compromise

4 hops · AWS admin-equivalent access achieved

Chain Summary
Cloud ProviderAWS
Entry PointCompute
Hops to Admin4
Risk RatingCRITICAL
Key Policies Abused
iam:GetInstanceProfile
ec2-ssm-role
sts:AssumeRole
ec2-ssm-role → AssumeRole
iam:AttachRolePolicy
dev-admin-role → AdministratorAccess attach
ALL ACTIONS
arn:aws:iam::aws:policy/AdministratorAccess
Hover any hop card to see the specific API call and evidence that proves exploitability.
Read-only validation — no writes to cloud
CONTAINER SECURITY POSTURE · SIX-DIMENSION RISK SCORECARD

Six layers of container risk.
Each scored. Each actionable.

Runtime validation surfaces posture across pod security, RBAC, network policy, image hygiene, secrets management, and runtime monitoring — with specific findings and fix guidance per dimension.

48
Overall Score
34
Security Dimension
Pod Security
CRITICAL4 active findings
Active Findings
12 pods running as root (runAsNonRoot: false)
7 containers with allowPrivilegeEscalation: true
3 pods with hostPID: true in production namespace
CAP_SYS_ADMIN granted to 2 workloads
Remediation Guidance

Set runAsNonRoot:true, drop all capabilities, apply PodSecurityAdmission Restricted

RUNTIME THREAT DETECTION · eBPF SYSCALL EVENT FEED

Kernel-level visibility
across every container, live.

Runtime validation intercepts syscall events at the kernel level via eBPF — detecting container escapes, credential theft, shell spawns, and C2 connectivity the moment they happen, without agents inside the container.

spakto-falco:~$ runtime-events --namespace all --filter all
LIVE
SEVERITYPODNAMESPACESYSCALLEVENTRULEMITRE
Waiting for events…
eBPF hookSyscall intercepted at kernel ring-0 via eBPF probe
Zero-agentNo sidecar or in-container instrumentation required
<1ms latencyDetection at kernel time, not log-scrape time
MITRE-mappedEvery event tagged to ATT&CK container matrix
NETWORK REACHABILITY MAPPER · VPC · NETWORKPOLICY · SECURITY GROUP ANALYSIS

Which pods can reach
what — proven, not assumed.

NetworkPolicy rules, Security Groups, and hostNetwork declarations are mapped into a live reachability graph. Click any source node, then any target to see whether that path is open or blocked, and which rule permits or denies it.

k8s-network-map://prod-cluster — click FROM then TO to probe path
Allowed
Denied
Risk
80/tcp0.0.0.0/0InternetLB-EXTLoadBalancerapi-serverprod nsworker-jobbatch nsFROMredis-cacheprod nspostgres-0db nssvc/postgresClusterIP169.254.169.254IMDS endpointTOnode-01host networkkube-dnskube-system
Path Result
⚠ RISKY
Fromworker-job
To169.254.169.254
Ports80/tcp
RuleNo NP blocking IMDS — EXPOSED
Open Risk Paths
HIGH8080/tcp
worker-jobapi-server
NP: batch→prod DENY (no policy)
CRITICAL80/tcp
api-server169.254.169.254
No NP blocking IMDS — EXPOSED
CRITICAL80/tcp
worker-job169.254.169.254
No NP blocking IMDS — EXPOSED
CRITICALall
postgres-0node-01
hostNetwork:true on pod-db
HIGH443/tcp
worker-job0.0.0.0/0
No egress NP — direct internet
Namespace Key
prod
batch
db
kube-system
host
external
SUPPLY CHAIN VULNERABILITY TRACER · IMAGE LAYER ANALYSIS · CVE EXPLOIT PATH

Every image layer.
Every CVE. Every exploit path.

Container security requires understanding which vulnerabilities exist at each image layer, and critically — which ones are actually exploitable given your container configuration. Spakto traces CVE exploit paths from base OS through to runtime entrypoint.

7
Total CVEs
4
Exploitable
9.8
Max CVSS
5
Layers
Image Layers (bottom → top)
Deps3 vulnerabilities
CVE-2022-42969py 1.11.0EXPLOITABLE
CVSS
9.8

ReDoS in py.path.svn — not in exec path but package present

Exploit path confirmed — validates in runtime context
CVE-2023-43804urllib3 1.26.12EXPLOITABLE
CVSS
8.8

Cookie injection via Set-Cookie header — can steal session tokens in proxy scenarios

Exploit path confirmed — validates in runtime context
CVE-2023-45803urllib3 1.26.12
CVSS
7.4

Request body not cleaned on 303 redirect — informational only

CLOUD RUNTIME VALIDATION FAQs

Frequently asked
questions.

Still have questions?
Our security engineers answer within one business day.
Ask a question