Description

A Helm chart for Argo CD Image Updater, a tool to automatically update the container images of Kubernetes workloads which are managed by Argo CD

Overview

IdentityNamespaceAutomountSecretsPermissionsWorkloadsRisk
argocd-image-updaterdefault101Critical

Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.


Identities

🤖 argocd-image-updater

Namespace: default  |  Automount:

🔑 Permissions (10)

RoleResourceVerbsRiskTags
Role argocd-image-updater-leader-election-rolecoordination.k8s.io/leasescreate · delete · get · list · patch · update · watchCriticalControlPlaneDisruption CriticalNamespace DenialOfService Tampering
Role argocd-image-updatercore/secretsget · list · watchCriticalCredentialAccess DataExposure InformationDisclosure SecretAccess
Role argocd-image-updater-leader-election-rolecore/configmapscreate · delete · get · list · patch · update · watchHighConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering
Role argocd-image-updatercore/configmapsget · list · watchMediumConfigMapAccess DataExposure InformationDisclosure
ClusterRole argocd-image-updaterargoproj.io/applicationsget · list · patch · update · watchLow
ClusterRole argocd-image-updatercore/eventscreateLow
Role argocd-image-updater-leader-election-rolecore/eventscreate · patchLow
ClusterRole argocd-image-updaterargocd-image-updater.argoproj.io/imageupdaterscreate · delete · get · list · patch · update · watchLow
ClusterRole argocd-image-updaterargocd-image-updater.argoproj.io/imageupdaters/finalizersupdateLow
ClusterRole argocd-image-updaterargocd-image-updater.argoproj.io/imageupdaters/statusget · patch · updateLow

⚠️ Potential Abuse (5)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentargocd-image-updater-controllerargocd-image-updater-controllerquay.io/argoprojlabs/argocd-image-updater:v1.0.1