Description

A Helm chart for EDP Install

Overview

IdentityNamespaceAutomountSecretsPermissionsWorkloadsRisk
edp-cd-pipeline-operatordefault321High
gitlab-cistub-namespace140High
edp-admin-consoledefault151Medium
edp-admin-console-operatordefault221Medium
edp-jenkins-operatordefault641Medium
edp-tekton-dashboarddefault201Medium
jenkinsdefault211Medium
tektondefault90Medium
edp-codebase-operatordefault11Low
edp-tekton-interceptordefault81Low
tekton-resource-prunerdefault21Low
edp-gerrit-operatordefault01
edp-headlampdefault01
edp-kanikostub-namespace00
edp-keycloak-operatordefault01
edp-nexus-operatordefault01
edp-perf-operatordefault01
edp-sonar-operatordefault01
gerritdefault01
nexusdefault01
nexus-proxydefault01
sonardefault02
tekton-triggers-sa-defaultdefault00

Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.


Identities

🤖 edp-cd-pipeline-operator

Namespace: default  |  Automount:

🔑 Permissions (32)

RoleResourceVerbsRiskTags
Role edp-cd-pipeline-operator*/configmaps*HighConfigMapAccess DataExposure InformationDisclosure NamespaceAdmin NamespaceWideAccess (+3 more)
ClusterRole edp-cd-pipeline-operator-stub-namespacecore/namespacescreate · delete · get · listHighDenialOfService NamespaceLifecycle ResourceDeletion
Role edp-cd-pipeline-operator*/cdpipelines*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/cdpipelines/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/cdpipelines/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/codebasebranches*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/codebasebranches/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/codebasebranches/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/codebaseimagestreams*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/codebaseimagestreams/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/codebaseimagestreams/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/codebases*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/codebases/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/codebases/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/edpcomponents*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/edpcomponents/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/edpcomponents/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/events*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/gitservers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/gitservers/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/gitservers/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/jenkins*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/jenkinsfolders*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/jenkinsfolders/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/jenkinsfolders/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/jenkinsjobs*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/jenkinsjobs/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/jenkinsjobs/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/stages*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/stages/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operator*/stages/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-cd-pipeline-operatorcoordination.k8s.io/leasescreate · get · list · updateLow

⚠️ Potential Abuse (5)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentcd-pipeline-operatorcd-pipeline-operatorepamedp/cd-pipeline-operator:2.14.1

🤖 gitlab-ci

Namespace: stub-namespace  |  Automount:

🔑 Permissions (14)

RoleResourceVerbsRiskTags
Role gitlab-ci*/configmaps*HighConfigMapAccess DataExposure InformationDisclosure NamespaceAdmin NamespaceWideAccess (+3 more)
Role gitlab-ci*/codebasebranches*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role gitlab-ci*/codebasebranches/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role gitlab-ci*/codebaseimagestreams*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role gitlab-ci*/codebaseimagestreams/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role gitlab-ci*/gittags*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role gitlab-ci*/gittags/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role gitlab-ci*/imagestreamimages*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role gitlab-ci*/imagestreammappings*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role gitlab-ci*/imagestreams*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role gitlab-ci*/imagestreams/layers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role gitlab-ci*/imagestreams/secrets*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role gitlab-ci*/imagestreamtags*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role gitlab-ci*/imagestreamtags/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission

⚠️ Potential Abuse (3)

The following security risks were found based on the above permissions:

📦 Workloads (0)

No workloads use this ServiceAccount.


🤖 edp-jenkins-operator

Namespace: default  |  Automount:

🔑 Permissions (64)

RoleResourceVerbsRiskTags
Role edp-jenkins-operator-stub-namespace*/adminconsoles*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/cdpipelines*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/cdpipelines/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/cdpipelines/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/cdstagedeployments*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/cdstagedeployments/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/cdstagedeployments/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/cdstagejenkinsdeployments*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/cdstagejenkinsdeployments/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/cdstagejenkinsdeployments/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/codebasebranches*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/codebaseimagestreams*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/codebases*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/codebases/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/edpcomponents*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/events*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/gerrits*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/gitservers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkins*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkins/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkins/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsagents*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsagents/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsagents/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsauthorizationrolemappings*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsauthorizationrolemappings/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsauthorizationrolemappings/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsauthorizationroles*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsauthorizationroles/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsauthorizationroles/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinses*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinses/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinses/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsfolders*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsfolders/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsfolders/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsjobbuildruns*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsjobbuildruns/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsjobs*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsjobs/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsjobs/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsscripts*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsscripts/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsscripts/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsserviceaccounts*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsserviceaccounts/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinsserviceaccounts/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinssharedlibraries*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinssharedlibraries/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jenkinssharedlibraries/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/jirafixversions*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/keycloakclients*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/keycloakclients/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/keycloakclients/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/keycloakrealms*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/keycloakrealms/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/keycloaks*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/keycloaks/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/nexuses*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/projectrequests*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/stages*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/stages/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespace*/stages/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-jenkins-operator-stub-namespacecoordination.k8s.io/leasescreate · get · list · updateLow

⚠️ Potential Abuse (2)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentjenkins-operatorjenkins-operatorepamedp/jenkins-operator:2.14.0

🤖 edp-admin-console-operator

Namespace: default  |  Automount:

🔑 Permissions (22)

RoleResourceVerbsRiskTags
Role edp-admin-console-operator-stub-namespace*/adminconsoles*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespace*/adminconsoles/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespace*/adminconsoles/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespace*/cdpipelines*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespace*/cdpipelines/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespace*/codebasebranches*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespace*/codebasebranches/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespace*/codebases*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespace*/codebases/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespace*/configmapsgetMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespace*/edpcomponents*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespace*/events*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespace*/keycloakclients*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespace*/keycloakclients/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespace*/keycloakclients/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespace*/keycloakrealms*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespace*/keycloakrealms/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespace*/keycloaks*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespace*/keycloaks/status*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespace*/stages*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespace*/stages/finalizers*MediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-admin-console-operator-stub-namespacecoordination.k8s.io/leasescreate · get · list · updateLow

⚠️ Potential Abuse (2)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentadmin-console-operatoradmin-console-operatorepamedp/admin-console-operator:2.14.0

🤖 jenkins

Namespace: default  |  Automount:

🔑 Permissions (21)

RoleResourceVerbsRiskTags
Role jenkins-resources-role*/adminconsolescreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role jenkins-resources-role*/cdpipelinescreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role jenkins-resources-role*/codebasebranchescreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role jenkins-resources-role*/codebasebranches/statuscreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role jenkins-resources-role*/codebaseimagestreamscreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role jenkins-resources-role*/codebasescreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role jenkins-resources-role*/codebases/finalizerscreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role jenkins-resources-role*/edpcomponentscreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role jenkins-resources-role*/gitserverscreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role jenkins-resources-role*/jenkinscreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role jenkins-resources-role*/jenkinsescreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role jenkins-resources-role*/jirafixversionscreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role jenkins-resources-role*/jiraissuemetadatascreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role jenkins-resources-role*/jiraissuemetadatas/finalizerscreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role jenkins-resources-role*/jiraissuemetadatas/statuscreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role jenkins-resources-role*/keycloakrealmscreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role jenkins-resources-role*/nexusescreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role jenkins-resources-role*/stagescreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role jenkins-resources-rolebuild.openshift.io/buildconfigslistLow
Role jenkins-resources-rolebuild.openshift.io/buildslistLow
Role jenkins-resources-roleimage.openshift.io/imagestreamslistLow

⚠️ Potential Abuse (2)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentjenkinsedp-jenkinsepamedp/edp-jenkins:2.13.0

🤖 edp-tekton-dashboard

Namespace: default  |  Automount:

🔑 Permissions (20)

RoleResourceVerbsRiskTags
Role tekton-dashboard-tenantcore/pods/logget · list · watchMediumDataExposure InformationDisclosure LogAccess
Role tekton-dashboard-backendapiextensions.k8s.io/customresourcedefinitionsget · listLow
Role tekton-dashboard-tenanttriggers.tekton.dev/eventlistenerscreate · delete · get · list · patch · update · watchLow
Role tekton-dashboard-tenantcore/eventsget · list · watchLow
Role tekton-dashboard-backenddashboard.tekton.dev/extensionscreate · delete · patch · updateLow
Role tekton-dashboard-tenantdashboard.tekton.dev/extensionsget · list · watchLow
Role tekton-dashboard-tenanttriggers.tekton.dev/interceptorscreate · delete · get · list · patch · update · watchLow
Role tekton-dashboard-tenantcore/namespacesget · list · watchLow
Role tekton-dashboard-tenanttekton.dev/pipelineresourcescreate · delete · get · list · patch · update · watchLow
Role tekton-dashboard-tenanttekton.dev/pipelinerunscreate · delete · get · list · patch · update · watchLow
Role tekton-dashboard-tenanttekton.dev/pipelinescreate · delete · get · list · patch · update · watchLow
Role tekton-dashboard-tenantcore/podsget · list · watchLow
Role tekton-dashboard-tenanttekton.dev/runscreate · delete · get · list · patch · update · watchLow
Role tekton-dashboard-backendsecurity.openshift.io/securitycontextconstraintsuseLow
Role tekton-dashboard-backendcore/serviceaccountsget · list · watchLow
Role tekton-dashboard-tenanttekton.dev/taskrunscreate · delete · get · list · patch · update · watchLow
Role tekton-dashboard-tenanttekton.dev/taskscreate · delete · get · list · patch · update · watchLow
Role tekton-dashboard-tenanttriggers.tekton.dev/triggerbindingscreate · delete · get · list · patch · update · watchLow
Role tekton-dashboard-tenanttriggers.tekton.dev/triggerscreate · delete · get · list · patch · update · watchLow
Role tekton-dashboard-tenanttriggers.tekton.dev/triggertemplatescreate · delete · get · list · patch · update · watchLow

⚠️ Potential Abuse (2)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentedp-tekton-dashboardtekton-dashboardgcr.io/tekton-releases/github.com/tektoncd/dashboard/cmd/dashboard:v0.32.0

🤖 edp-admin-console

Namespace: default  |  Automount:

🔑 Permissions (15)

RoleResourceVerbsRiskTags
Role edp-resources-admin*/cdpipelinescreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-resources-admin*/cdpipelines/finalizerscreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-resources-admin*/codebasebranchescreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-resources-admin*/codebasebranches/finalizerscreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-resources-admin*/codebaseimagestreamsget · listMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-resources-admin*/codebasescreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-resources-admin*/codebases/finalizerscreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-resources-admin*/edpcomponentsget · listMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-resources-admin*/gitserverslistMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-resources-admin*/jenkinsget · listMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-resources-admin*/jiraserverscreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-resources-admin*/jiraservers/finalizerscreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-resources-admin*/perfserverslistMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-resources-admin*/stagescreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission
Role edp-resources-admin*/stages/finalizerscreate · delete · get · list · patch · updateMediumNamespaceAdmin NamespaceWideAccess WildcardPermission

⚠️ Potential Abuse (1)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentedp-admin-consoleedp-admin-consoleepamedp/edp-admin-console:2.14.0

🤖 tekton

Namespace: default  |  Automount:

🔑 Permissions (9)

RoleResourceVerbsRiskTags
Role tekton-pipeline-rolecore/configmapsget · list · watchMediumConfigMapAccess DataExposure InformationDisclosure
Role tekton-pipeline-rolev2.edp.epam.com/cdpipelinesget · list · patch · updateLow
Role tekton-pipeline-rolev2.edp.epam.com/codebasebranchesget · list · patch · updateLow
Role tekton-pipeline-rolev2.edp.epam.com/codebasebranches/statusget · list · patch · updateLow
Role tekton-pipeline-rolev2.edp.epam.com/codebaseimagestreamsget · list · patch · updateLow
Role tekton-pipeline-rolev2.edp.epam.com/codebasesget · list · patch · updateLow
Role tekton-pipeline-rolev1.edp.epam.com/edpcomponentsgetLow
Role tekton-pipeline-rolev2.edp.epam.com/jiraissuemetadatascreate · getLow
Role tekton-pipeline-rolev2.edp.epam.com/stagesget · list · patch · updateLow

⚠️ Potential Abuse (2)

The following security risks were found based on the above permissions:

📦 Workloads (0)

No workloads use this ServiceAccount.


🤖 edp-tekton-interceptor

Namespace: default  |  Automount:

🔑 Permissions (8)

RoleResourceVerbsRiskTags
Role tekton-triggers-edp-interceptorv2.edp.epam.com/codebasebranchesget · list · watchLow
Role tekton-triggers-edp-interceptorv2.edp.epam.com/codebasebranches/finalizersget · list · watchLow
Role tekton-triggers-edp-interceptorv2.edp.epam.com/codebasebranches/statusget · list · watchLow
Role tekton-triggers-edp-interceptorv2.edp.epam.com/codebasesget · list · watchLow
Role tekton-triggers-edp-interceptorv2.edp.epam.com/codebases/finalizersget · list · watchLow
Role tekton-triggers-edp-interceptorv2.edp.epam.com/codebases/statusget · list · watchLow
Role tekton-triggers-edp-interceptortriggers.tekton.dev/interceptorsget · list · update · watchLow
Role tekton-triggers-edp-interceptorcore/secrets (restricted to: tekton-edp-interceptor-certs)create · get · list · update · watchLowCredentialAccess DataExposure InformationDisclosure ResourceNameRestricted SecretAccess

⚠️ Potential Abuse (2)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentedp-tekton-interceptortekton-triggers-edp-interceptorepamedp/edp-tekton:0.4.0

🤖 tekton-resource-pruner

Namespace: default  |  Automount:

🔑 Permissions (2)

RoleResourceVerbsRiskTags
Role tekton-resource-prunertekton.dev/pipelinerunsdelete · listLow
Role tekton-resource-prunertekton.dev/pipelinesdelete · listLow

⚠️ Potential Abuse (1)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
CronJobtekton-resource-prunerpruner-tkn-tekton-pipelinesgcr.io/tekton-releases/dogfooding/tkn@sha256:025de221fb059ca24a3b2d988889ea34bce48dc76c0cf0d6b4499edb8c21325f

🤖 edp-codebase-operator

Namespace: default  |  Automount:

🔑 Permissions (1)

RoleResourceVerbsRiskTags
ClusterRole edp-codebase-operator-stub-namespaceadmissionregistration.k8s.io/validatingwebhookconfigurationsget · patch · updateLow

⚠️ Potential Abuse (1)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentcodebase-operatorcodebase-operatorepamedp/codebase-operator:2.15.0

🤖 edp-gerrit-operator

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
Deploymentgerrit-operatorgerrit-operatorepamedp/gerrit-operator:2.14.0

🤖 edp-headlamp

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
Deploymentedp-headlampedp-headlampepamedp/edp-headlamp:0.5.0

🤖 edp-kaniko

Namespace: stub-namespace  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (0)

No workloads use this ServiceAccount.


🤖 edp-keycloak-operator

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
Deploymentkeycloak-operatorkeycloak-operatorepamedp/keycloak-operator:1.15.0

🤖 edp-nexus-operator

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
Deploymentnexus-operatornexus-operatorepamedp/nexus-operator:2.14.1

🤖 edp-perf-operator

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
Deploymentperf-operatorperf-operatorepamedp/perf-operator:2.13.0

🤖 edp-sonar-operator

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
Deploymentsonar-operatorsonar-operatorepamedp/sonar-operator:2.14.0

🤖 gerrit

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
Deploymentgerritgerritepamedp/edp-gerrit:3.6.2

🤖 nexus

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
Deploymentnexusnexussonatype/nexus3:3.43.0

🤖 nexus-proxy

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
Deploymentnexus-proxynexus-proxyquay.io/oauth2-proxy/oauth2-proxy:v7.4.0

🤖 sonar

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (2)

KindNameContainerImage
Deploymentsonarsonarsonarqube:8.9.10-community
Deploymentsonar-dbsonar-dbpostgres:9.6

🤖 tekton-triggers-sa-default

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (0)

No workloads use this ServiceAccount.