Chapter 16. Scanning pods for vulnerabilities