Overview
The Snyk Runtime Sensor is deployed as a Kubernetes DaemonSet. Leveraging eBPF, it extracts information about application behavior in runtime into Snyk AppRisk - the developer-first ASPM platform - to improve visibility into application risk and drive more efficient remediation and prioritization workflows.
Highlights
- Provides intelligence on applications in runtime to facilitate enhanced application discovery and improved vulnerability prioritization in Snyk AppRisk.
- Collects various runtime risk factors such as deployed images, loaded packages, etc.
- Supported in the following environments: * Kubernetes 1.19 or newer * Privileged access - either root, or the following Linux capabilities: BPF, PERFMON, SYS_RESOURCES, DAC_READ_SEARCH, SYS_PTRACE, NET_ADMIN * Cluster nodes must support BTF * Language support - Go, Java (8+), .NET (2.0.9+), Node.js (10+), Python (3.6+)
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Vendor refund policy
Free product - no refund policy in place.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Snyk Runtime Sensor Add-on
- Amazon EKS
EKS add-on
An add-on is software that provides supporting operational capabilities to Kubernetes applications but isn't specific to the application. This includes software like observability agents or Kubernetes drivers that allow the cluster to interact with underlying AWS resources for networking, compute, and storage. Add-on software is typically built and maintained by the Kubernetes community, cloud providers like AWS, or third-party vendors. Amazon EKS add-ons provide installation and management of a curated set of add-ons for Amazon EKS clusters. All Amazon EKS add-ons include the latest security patches and bug fixes, and are validated by AWS to work with Amazon EKS. Amazon EKS add-ons allow you to consistently ensure that your Amazon EKS clusters are secure and stable and reduce the amount of work that you need to do to install, configure, and update add-ons.
Version release notes
Performance enhancements
Additional details
Usage instructions
Obtain your Snyk Group ID and service account token and follow these steps: https://docs.snyk.io/integrate-with-snyk/snyk-runtime-sensor#aws-eks-deployment
Support
Vendor support
Snyk: Developer Security Platform Standard Support: Self-serve resources designed to help you quickly and successfully derive value throughout your security journey with Snyk. As part of any Snyk plan, we offer live sessions, on-demand videos, downloadable content, hands-on practice and other self-serve resources designed to help you quickly and successfully derive value throughout your security journey with Snyk. Find all of this content in the Snyk User Hub. https://snyk.io/user-hub/ Submit a ticket:
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Clear Visibility Into Deployed Code That Strengthens Security Confidence
Seamless Dev-First Security with Fast Scans and Actionable Fixes
Performance-wise, scans run fast even on large monorepos, and the dashboard stays responsive without lag, it never feels like a bottleneck in the CI pipeline.
On pricing and ROI, the value becomes clear quickly. Catching vulnerabilities pre-deployment rather than post-production saves significant incident response costs, and the free tier is generous enough for smaller teams to see real value before committing. Onboarding was smooth too, connecting GitHub repos took minutes and gave us an immediate risk picture. It feels like a security tool built for developers, which makes adoption across engineering teams much easier.
Pricing can become a pain point as teams scale. The jump between tiers feels steep, and some features that feel essential, like deeper reporting or SSO, are locked behind higher plans, which can be frustrating for mid-sized teams trying to justify the upgrade.
Occasionally the fix suggestions aren't actionable because the recommended version introduces breaking changes, so you still end up doing manual research. It would be more helpful if Snyk flagged compatibility risks alongside the fix recommendation. The Snyk Code (SAST) results can also feel less mature compared to the SCA side, more false positives and less context around why something is flagged.
Overall these are manageable drawbacks, but they do add friction for teams trying to run lean.
The biggest benefit has been reducing the gap between vulnerability discovery and remediation. Developers get context-rich alerts in their IDE and PRs rather than a spreadsheet from a security team weeks later, which means fixes happen faster and with less back-and-forth.
It also solves the visibility problem across open source dependencies. With complex dependency trees, it was previously difficult to know what you were actually running in production and whether it was safe. Snyk gives a clear, continuously updated picture of that risk without requiring manual audits.
From a team dynamic standpoint, it bridges the gap between developers and security teams by speaking the developer's language, showing fixes, not just findings. This has made security a shared responsibility rather than a blocker, which speeds up release cycles without compromising on risk management.
The ROI shows up in avoided incidents, faster PR cycles, and less time spent in reactive fire-fighting mode, all of which compound over time.