sm-operator
v0.1.0
1 Service Accounts
1 Workloads
10 Bindings
2 Critical
1 High
2 Medium
5 Low
Description
A Helm chart to install the Bitwarden Secrets Manager operator.
Overview
Identity | Namespace | Automount | Secrets | Permissions | Workloads | Risk |
---|---|---|---|---|---|---|
sm-operator-controller-manager | default | ❌ | — | 10 | 2 | Critical |
Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.
Identities
🤖 sm-operator-controller-manager
Namespace: default
| Automount: ❌
🔑 Permissions (10)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
Role sm-operator-leader-election-role | coordination.k8s.io/leases | create · delete · get · list · patch · update · watch | Critical | ControlPlaneDisruption CriticalNamespace DenialOfService Tampering |
ClusterRole sm-operator-manager-role | core/secrets | create · delete · get · list · patch · update · watch | Critical | ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure Persistence (+4 more) |
Role sm-operator-leader-election-role | core/configmaps | create · delete · get · list · patch · update · watch | High | ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering |
ClusterRole sm-operator-proxy-role | authorization.k8s.io/subjectaccessreviews | create | Medium | InformationDisclosure RBACQuery |
ClusterRole sm-operator-proxy-role | authentication.k8s.io/tokenreviews | create | Medium | CredentialAccess InformationDisclosure RBACQuery |
ClusterRole sm-operator-manager-role | k8s.bitwarden.com/bitwardensecrets | create · delete · get · list · patch · update · watch | Low | |
ClusterRole sm-operator-manager-role | k8s.bitwarden.com/bitwardensecrets/finalizers | update | Low | |
ClusterRole sm-operator-manager-role | k8s.bitwarden.com/bitwardensecrets/status | get · patch · update | Low | |
Role sm-operator-leader-election-role | core/events | create · patch | Low | |
ClusterRole sm-operator-manager-role | core/secrets/status | get | Low |
⚠️ Potential Abuse (10)
The following security risks were found based on the above permissions:
- Read secrets cluster-wide
- Read secrets in a namespace
- Modify secrets cluster-wide
- Modify secrets in a namespace
- Read ConfigMaps in a namespace
- Modify ConfigMaps in a namespace
- Create TokenReviews (validate arbitrary tokens)
- Create SubjectAccessReviews (check arbitrary permissions)
- Manage Leases in kube-system or kube-node-lease namespace
📦 Workloads (2)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | sm-operator-controller-manager | kube-rbac-proxy | gcr.io/kubebuilder/kube-rbac-proxy:v0.14.1 |
Deployment | sm-operator-controller-manager | manager | ghcr.io/bitwarden/sm-operator:0.1.0 |