talos168Talos investates software and operating system vulnerabilities in order to discover them before malicious threat actors do. We provide this information to vendors soIn this guide we assume that Talos client conf is available and Talos API access is available. Kubernetes client confuration can be pulled from control plane nodes with