You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# ThreatMapper - Runtime Threat Management and Attack Path Enumeration for Cloud Native
14
10
@@ -30,11 +26,6 @@ ThreatMapper carries on the good 'shift left' security practices that you alread
30
26
Use ThreatMapper to provide security observability for your production workloads and infrastructure, across cloud, kubernetes, serverless (Fargate) and on-prem platforms.
31
27
32
28
33
-
<!--- # (# Getting Started with ThreatMapper) --->
Note: Image tag `quay.io/deepfenceio/deepfence_agent_ce:2.5.7-multiarch` is supported in amd64 and arm64/v8 architectures.
93
+
Note: Image tag `quay.io/deepfenceio/deepfence_agent_ce:2.5.8-multiarch` is supported in amd64 and arm64/v8 architectures.
103
94
104
95
On a Kubernetes platform, the sensors are installed using [helm chart](https://threatmapper.org/threatmapper/docs/v2.5/sensors/kubernetes/)
105
96
@@ -137,12 +128,3 @@ Please file GitHub issues as needed, and join the Deepfence Community [Slack cha
137
128
The Deepfence ThreatMapper project (this repository) is offered under the [Apache2 license](https://www.apache.org/licenses/LICENSE-2.0).
138
129
139
130
[Contributions](CONTRIBUTING.md) to Deepfence ThreatMapper project are similarly accepted under the Apache2 license, as per [GitHub's inbound=outbound policy](https://docs.github.com/en/github/site-policy/github-terms-of-service#6-contributions-under-repository-license).
140
-
141
-
# Performance Stats of deepfence/ThreatMapper - Last 28 days
0 commit comments