K9S is fast, powerful, and dangerous when dealing with sensitive data. By default, it exposes resource details from Kubernetes clusters—ConfigMaps, Secrets, environment variables—without filters. This speed can be a liability if the terminal is open in the wrong place or to the wrong person.
Sensitive data in K9S includes:
- Kubernetes Secrets with base64-encoded values.
- Environment variables injected into Pods.
- ConfigMaps storing internal configuration.
- Logs containing credentials, tokens, and user information.
K9S offers ways to reduce the risk. The primary defense is defining views that exclude risky namespaces and resources. You can mask Secret values with the --readonly flag or configure k9s.yaml to hide specific resource kinds. RBAC rules should limit who can access cluster secrets and logs. Audit these rules often.