A LinkedIn post from Infisical highlights ongoing security challenges in Kubernetes environments, particularly the risk of storing secrets in Git within GitOps workflows. The post points readers to a new educational video that explains why native Kubernetes Secrets may be unsafe for Git-based deployments and details how the Sealed Secrets controller and kubeseal operate.
Claim 30% Off TipRanks
- Unlock hedge fund-level data and powerful investing tools for smarter, sharper decisions
- Discover top-performing stock ideas and upgrade to a portfolio of market leaders with Smart Investor Picks
According to the post, the video also outlines the concept of encrypting data before it enters Git and decrypting it inside the cluster, while emphasizing key limitations of Sealed Secrets in production use. By positioning Sealed Secrets as suitable only for certain teams and workflows, Infisical appears to be engaging security-conscious DevOps users, which could support product adoption, deepen ecosystem credibility, and strengthen its competitive standing in Kubernetes and GitOps-focused infrastructure markets.

