The secureCodeBox is running on Kubernetes. To install it you need Helm, a package manager for Kubernetes. For your first steps Kubernetes from Docker Desktop, Minikube or KIND is sufficient. We also provide a Vargant based all-in-one installation (see below).

First of all you need to install the secureCodeBox Operator which is responsible for starting all security scans.

# Add the secureCodeBox Helm Repo
helm repo add secureCodeBox
# Create a new namespace for the secureCodeBox Operator
kubectl create namespace securecodebox-system
# Install the Operator & CRD's
helm --namespace securecodebox-system upgrade --install securecodebox-operator secureCodeBox/operator

If you didn't see any errors you now have the secureCodeBox Operator up and running! ๐Ÿฅณ ๐Ÿš€

Your now ready to install your first scan types and start your first scans.

Version Support

The secureCodeBox supports the 4 latest Kubernetes releases (v1.20, v1.19, v1.18 & v1.17). Older version might also work but are not officially supported or tested.

To install the secureCodeBox we recommend using Helm at version 3.

Accessing the included Minio Instance

The default secureCodeBox Operator included a Minio instance, which acts as a local S3 filestorage api used by the secureCodeBox to store the results files of its scans. You can switch it out with a S3 compatible api provided by most cloud providers.

You can access the minio instance included in the default installation like the following:

Port Forward Minio UI: kubectl port-forward -n securecodebox-system service/securecodebox-operator-minio 9000:9000

  • AccessKey: kubectl get secret securecodebox-operator-minio -n securecodebox-system -o=jsonpath='{.data.accesskey}' | base64 --decode; echo
  • SecretKey: kubectl get secret securecodebox-operator-minio -n securecodebox-system -o=jsonpath='{.data.secretkey}' | base64 --decode; echo

Then open your browser on http://localhost:9000 and login in with the credentials returned by the command listed above.

Operator Configuration Options

Using a hosted S3 Buckets as storage backend

To change out the default minio instance with a S3 Bucket from a cloud provider you can update the helm values to connect the operator with you S3 bucket.

AWS S3 Buckets

# disable the local minio instance
enabled: false
enabled: true
# update the region to match the location of your bucket
endpoint: ""
bucket: "your-own-securecodebox-bucket-name"
# Name to a k8s secret with 'accesskey' and 'secretkey' as attributes in the same namespace as this release
# Example creation via kubectl:
# kubectl create secret generic securecodebox-s3-credentials --from-literal=accessKey="******" --from-literal=secretKey="******"
keySecret: securecodebox-s3-credentials

Google Cloud Storage

# disable the local minio instance
enabled: false
enabled: true
bucket: your-own-securecodebox-bucket-name
# Name to a k8s secret with 'accesskey' and 'secretkey' as attributes in the same namespace as this release
# Example creation via kubectl:
# kubectl create secret generic gcs-bucket-credentials --from-literal=accessKey="******" --from-literal=secretKey="******"
keySecret: gcs-bucket-credentials

Install SCB Scanner

The following list will give you a short overview of all supported security scanner charts and how to install them. You will find a more detailed documentation for each scanner in our Scanners documentation section.


If you are installing the secureCodeBox the first time we recommend to read the first scans documentation first.

You can optionally deploy SCB scanner charts for each security scanner you want to use. They should not be installed into the securecodebox-system namespace like the operator, but into the individual namespaces where you want to run the scans.

# The following chart will be installed in the `default` namespace by you can choose the namespace of your choice by
# adding `--namespace YOURNAMESPACE` to each line
helm upgrade --install amass secureCodeBox/amass
helm upgrade --install gitleaks secureCodeBox/gitleaks
helm upgrade --install kube-hunter secureCodeBox/kube-hunter
helm upgrade --install nikto secureCodeBox/nikto
helm upgrade --install nmap secureCodeBox/nmap
helm upgrade --install ssh-scan secureCodeBox/ssh_scan
helm upgrade --install sslyze secureCodeBox/sslyze
helm upgrade --install trivy secureCodeBox/trivy
helm upgrade --install wpscan secureCodeBox/wpscan
helm upgrade --install zap secureCodeBox/zap

Install some demo targets

If you want to test some of the security scanners within your namespace you can use some demo targets.


As these demo targets are intentionally vulnerable you shouldn't expose them to the internet - keep them internal. Otherwise you could be targeted by someone else really fast ๐Ÿ˜ˆ

helm upgrade --install dummy-ssh secureCodeBox/dummy-ssh
helm upgrade --install bodgeit secureCodeBox/bodgeit
helm upgrade --install juice-shop secureCodeBox/juice-shop
helm upgrade --install old-wordpress secureCodeBox/old-wordpress
helm upgrade --install swagger-petstore secureCodeBox/swagger-petstore

These charts will be installed in the default namespace, but you can choose the namespace of your choice by adding --namespace YOURNAMESPACE to each helm command.

Vagrant All-in-one Installation

We provide a Vagrant setupt with everything installed (Kubernetes cluster, operator, scanners, hooks, demo applications, etc.). You only need Vagrant installed and our main repository to play around with secureCodeBox:

git clone
cd secureCodeBox
vagrant up

After this setup has finished just ssh into the vagrant box:

vagrant ssh

Now you can start with your first scan.


Minio Startup Problems

If your secureCodeBox Operator install is failing , and you see that the operator pod seems to be working okay, but the minio pods started along side it does not start up properly, your probably cluster isn't configured to have a working default Storage Class for Persistent Volumes.

Suggested solutions:

  • Use a Cloud Storage provider instead of Minio. This has to provide a API compatible to AWS S3. Providers that we have tried and worked great include:
    • AWS S3
    • Google Cloud Storage
    • DigitalOcean Spaces
  • Configure Minio to use a HostPath Volume. This is more work to set up and manage, but also works for local / on-prem installation.

ClusterRole & CRD Issues

The secureCodeBox Operator Helm Chart contains Custom Resource Definitions and ClusterRoles which is usually reserved to administrators of production cluster (and rightfully so ๐Ÿ˜„). If you are just testing out the secureCodeBox consider using a local Kubernetes Cluster with tools like kind, minikube or Docker Desktops (Mac/Windows) Kubernetes cluster.

Running on Windows

There are multiple ways to install Kubernetes and Helm to run secureCodeBox on Windows. One easy method is to install Docker Desktop then enable Kubernetes in the Settings. While installing a current version of Docker Desktop you will be prompted to install Linux Subsystem for Windows (WSL2). Now you can continue the installation on either Windows or the Linux Subsystem.

  • For Windows: Install Helm for Windows like instructed on the website. Usually installing from Binaries will be easy.
  • For Linux Subsystem: Install the Linux Distribution of your choice from the Microsoft Store (Ubuntu 18.04 works fine). Now install Helm for the chosen Distribution (e.g. using Apt for Ubuntu).