monitoring-operator
v2025.4.30
1 Service Accounts
1 Workloads
28 Bindings
2 Critical
5 High
4 Medium
17 Low
Description
A Helm chart for monitoring-operator by AppsCode
Overview
Identity | Namespace | Automount | Secrets | Permissions | Workloads | Risk |
---|---|---|---|---|---|---|
monitoring-operator | default | ❌ | — | 28 | 1 | Critical |
Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.
Identities
🤖 monitoring-operator
Namespace: default
| Automount: ❌
🔑 Permissions (28)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole monitoring-operator | apiextensions.k8s.io/customresourcedefinitions | * | Critical | CRDManipulation ClusterWideAccess PotentialPrivilegeEscalation Tampering |
ClusterRole monitoring-operator | core/secrets | create · get · list · patch · update · watch | Critical | ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess |
ClusterRole monitoring-operator | appcatalog.appscode.com/* | get · list · watch | High | ClusterWideAccess |
ClusterRole monitoring-operator | openviz.dev/* | * | High | ClusterWideAccess |
ClusterRole monitoring-operator | ui.openviz.dev/* | * | High | ClusterWideAccess |
ClusterRole monitoring-operator | core/configmaps | get · list · watch | High | ConfigMapAccess DataExposure InformationDisclosure |
ClusterRole monitoring-operator | core/services/proxy | * | High | ClusterWideAccess |
ClusterRole monitoring-operator | rbac.authorization.k8s.io/clusterrolebindings | get · list · watch | Medium | InformationDisclosure RBACQuery Reconnaissance |
ClusterRole monitoring-operator | rbac.authorization.k8s.io/clusterroles | create · get · list · patch · update · watch | Medium | InformationDisclosure RBACQuery Reconnaissance |
ClusterRole monitoring-operator | rbac.authorization.k8s.io/rolebindings | create · get · list · patch · update · watch | Medium | InformationDisclosure RBACQuery Reconnaissance |
ClusterRole monitoring-operator | rbac.authorization.k8s.io/roles | get · list · watch | Medium | InformationDisclosure RBACQuery Reconnaissance |
ClusterRole monitoring-operator | monitoring.coreos.com/alertmanagerconfigs | create · get · list · patch · watch | Low | |
ClusterRole monitoring-operator | monitoring.coreos.com/alertmanagers | get · list · watch | Low | |
ClusterRole monitoring-operator | apiregistration.k8s.io/apiservices | get · list · watch | Low | |
ClusterRole monitoring-operator | appcatalog.appscode.com/appbindings | create · get · list · patch · update · watch | Low | |
ClusterRole monitoring-operator | charts.x-helm.dev/chartpresets | create · delete · get · list · patch · update · watch | Low | |
ClusterRole monitoring-operator | charts.x-helm.dev/clusterchartpresets | create · delete · get · list · patch · update · watch | Low | |
ClusterRole monitoring-operator | cluster.open-cluster-management.io/clusterclaims | get · list · watch | Low | |
ClusterRole monitoring-operator | apps/deployments | get · list · watch | Low | |
ClusterRole monitoring-operator | core/endpoints | create · get · list · patch · update · watch | Low | |
ClusterRole monitoring-operator | operator.open-cluster-management.io/klusterlets | get · list · watch | Low | |
ClusterRole monitoring-operator | core/namespaces | create · get · list · patch · update · watch | Low | ClusterStructure InformationDisclosure Reconnaissance |
ClusterRole monitoring-operator | core/nodes | get · list · watch | Low | |
ClusterRole monitoring-operator | monitoring.coreos.com/prometheuses | get · list · patch · update · watch | Low | |
ClusterRole monitoring-operator | meta.k8s.appscode.com/resourcequeries | create | Low | |
ClusterRole monitoring-operator | core/serviceaccounts | create · get · list · patch · update · watch | Low | |
ClusterRole monitoring-operator | monitoring.coreos.com/servicemonitors | create · get · list · patch · update · watch | Low | |
ClusterRole monitoring-operator | core/services | create · get · list · patch · update · watch | Low |
⚠️ Potential Abuse (9)
The following security risks were found based on the above permissions:
- Read secrets cluster-wide
- Read secrets in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Manage CustomResourceDefinitions
- Read RBAC configuration cluster-wide
- List Namespaces (Cluster Reconnaissance)
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | monitoring-operator | operator | ghcr.io/appscode/grafana-tools:v0.4.1 |