1 Service Accounts
1 Workloads
21 Bindings
8 Critical
1 Medium
12 Low
Description
A Helm chart to install Argo-Events in k8s Cluster
Overview
| Identity | Namespace | Automount | Secrets | Permissions | Workloads | Risk |
|---|---|---|---|---|---|---|
argo-events-sa | default | ❌ | — | 21 | 2 | Critical |
Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.
Identities
🤖 argo-events-sa
Namespace: default | Automount: ❌
🔑 Permissions (21)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
ClusterRole argo-events-role | core/configmaps | create · delete · get · list · patch · update · watch | Critical | ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering |
ClusterRole argo-events-role | apiextensions.k8s.io/customresourcedefinitions | create · delete · deletecollection · get · list · patch · update · watch | Critical | CRDManipulation PotentialPrivilegeEscalation Tampering |
ClusterRole argo-events-role | apps/deployments | create · delete · get · list · patch · update · watch | Critical | Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle |
ClusterRole argo-events-role | batch/jobs | create · delete · get · list · patch · update · watch | Critical | PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle |
ClusterRole argo-events-role | core/pods | create · delete · get · list · patch · update · watch | Critical | LateralMovement Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+1 more) |
ClusterRole argo-events-role | core/pods/exec | create · delete · get · list · patch · update · watch | Critical | ClusterWidePodExec CodeExecution ElevationOfPrivilege LateralMovement PodExec (+1 more) |
ClusterRole argo-events-role | core/secrets | create · delete · get · list · patch · update · watch | Critical | ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure Persistence (+4 more) |
ClusterRole argo-events-role | core/services | create · delete · get · list · patch · update · watch | Critical | DenialOfService NetworkManipulation ServiceExposure Tampering |
ClusterRole argo-events-role | core/events | create · delete · get · list · patch · update · watch | Medium | InformationDisclosure OperationalData Reconnaissance |
ClusterRole argo-events-role | apiextensions.k8s.io/v1beta1/customresourcedefinitions | create · delete · deletecollection · get · list · patch · update · watch | Low | |
ClusterRole argo-events-role | argoproj.io/eventsources | create · delete · deletecollection · get · list · patch · update · watch | Low | |
ClusterRole argo-events-role | argoproj.io/eventsources/finalizers | create · delete · deletecollection · get · list · patch · update · watch | Low | |
ClusterRole argo-events-role | argoproj.io/gateways | create · delete · deletecollection · get · list · patch · update · watch | Low | |
ClusterRole argo-events-role | argoproj.io/gateways/finalizers | create · delete · deletecollection · get · list · patch · update · watch | Low | |
ClusterRole argo-events-role | core/persistentvolumeclaims | create · delete · get · list · patch · update · watch | Low | |
ClusterRole argo-events-role | argoproj.io/sensors | create · delete · deletecollection · get · list · patch · update · watch | Low | |
ClusterRole argo-events-role | argoproj.io/sensors/finalizers | create · delete · deletecollection · get · list · patch · update · watch | Low | |
ClusterRole argo-events-role | argoproj.io/workflows | create · delete · deletecollection · get · list · patch · update · watch | Low | |
ClusterRole argo-events-role | argoproj.io/workflows/finalizers | create · delete · deletecollection · get · list · patch · update · watch | Low | |
ClusterRole argo-events-role | argoproj.io/workflowtemplates | create · delete · deletecollection · get · list · patch · update · watch | Low | |
ClusterRole argo-events-role | argoproj.io/workflowtemplates/finalizers | create · delete · deletecollection · get · list · patch · update · watch | Low |
⚠️ Potential Abuse (23)
The following security risks were found based on the above permissions:
- Cluster-wide pod exec
- Namespaced pod exec
- Create pods cluster-wide
- Create pods in a namespace
- Update/Patch pods cluster-wide
- Update/Patch pods in a namespace
- Read secrets cluster-wide
- Read secrets in a namespace
- Modify secrets cluster-wide
- Modify secrets in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Manage Deployments cluster-wide (potential for privileged pod execution)
- Manage Deployments in a namespace (potential for privileged pod execution)
- Manage Jobs cluster-wide (one-off privileged execution)
- Manage Jobs in a namespace (one-off privileged execution)
- Manage CustomResourceDefinitions
- Read events cluster-wide
- Manage Services cluster-wide
- Manage Services in a namespace
📦 Workloads (2)
| Kind | Name | Container | Image |
|---|---|---|---|
| Deployment | argo-events-gateway-controller | gateway-controller | argoproj/gateway-controller:v0.12 |
| Deployment | argo-events-sensor-controller | sensor-controller | argoproj/sensor-controller:v0.12 |