implementing-runtime-security-with-tetragon
mukul975/Anthropic-Cybersecurity-Skills
Implements eBPF-powered runtime security monitoring and enforcement for Kubernetes via Cilium Tetragon, covering tracing policies, enforcement actions, CLI workflows, and integrations to detect container escapes, sensitive file access, and crypto mining attempts.