local-eks-development
Audited by Socket on Feb 27, 2026
1 alert found:
SecurityThe code fragment constructs a plausible local EKS-parity development environment using Kind, LocalStack, and Keycloak with Skaffold hot reload and Telepresence. While functionally coherent for local parity, it contains notable credential exposures (plaintext admin credentials, realm passwords, client secrets, AWS test keys), broad host and network exposure, and multiple secret stores without standardized management. These factors elevate risk for credential leakage and potential compromise if artifacts are exposed or reused across environments. Treat as SUSPICIOUS-to-MALICIOUS in broader contexts and implement stronger secret handling, rotate credentials, pin images and manifests, restrict Telepresence usage to trusted networks, and adopt centralized secret management and least-privilege network policies. Provide a hardened, private-friendly variant for sharing, and document secure handling practices for local development.