Description

A Helm chart for flux2

Overview

IdentityNamespaceAutomountSecretsPermissionsWorkloadsRisk
helm-controllerdefault121Critical
image-automation-controllerdefault121Critical
image-reflector-controllerdefault121Critical
kustomize-controllerdefault121Critical
notification-controllerdefault121Critical
source-controllerdefault121Critical
flux2-flux-checkdefault01

Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.


Identities

🤖 helm-controller

Namespace: default  |  Automount:

🔑 Permissions (12)

RoleResourceVerbsRiskTags
ClusterRole crd-controllercore/configmapscreate · delete · get · list · patch · update · watchCriticalConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering
ClusterRole crd-controllercoordination.k8s.io/leasescreate · delete · get · list · patch · update · watchCriticalControlPlaneDisruption CriticalNamespace DenialOfService LeaderElectionAbuse Tampering
ClusterRole crd-controllercore/secretsget · list · watchCriticalClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess
ClusterRole crd-controllerhelm.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllerimage.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllerkustomize.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllernotification.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllersource.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllercore/configmaps/statusget · patch · updateLow
ClusterRole crd-controllercore/eventscreate · patchLow
ClusterRole crd-controllercore/namespacesget · list · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole crd-controllercore/serviceaccountsget · list · watchLow

⚠️ Potential Abuse (11)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymenthelm-controllermanagerghcr.io/fluxcd/helm-controller:v1.3.0

🤖 image-automation-controller

Namespace: default  |  Automount:

🔑 Permissions (12)

RoleResourceVerbsRiskTags
ClusterRole crd-controllercore/configmapscreate · delete · get · list · patch · update · watchCriticalConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering
ClusterRole crd-controllercoordination.k8s.io/leasescreate · delete · get · list · patch · update · watchCriticalControlPlaneDisruption CriticalNamespace DenialOfService LeaderElectionAbuse Tampering
ClusterRole crd-controllercore/secretsget · list · watchCriticalClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess
ClusterRole crd-controllerhelm.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllerimage.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllerkustomize.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllernotification.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllersource.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllercore/configmaps/statusget · patch · updateLow
ClusterRole crd-controllercore/eventscreate · patchLow
ClusterRole crd-controllercore/namespacesget · list · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole crd-controllercore/serviceaccountsget · list · watchLow

⚠️ Potential Abuse (11)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentimage-automation-controllermanagerghcr.io/fluxcd/image-automation-controller:v0.41.0

🤖 image-reflector-controller

Namespace: default  |  Automount:

🔑 Permissions (12)

RoleResourceVerbsRiskTags
ClusterRole crd-controllercore/configmapscreate · delete · get · list · patch · update · watchCriticalConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering
ClusterRole crd-controllercoordination.k8s.io/leasescreate · delete · get · list · patch · update · watchCriticalControlPlaneDisruption CriticalNamespace DenialOfService LeaderElectionAbuse Tampering
ClusterRole crd-controllercore/secretsget · list · watchCriticalClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess
ClusterRole crd-controllerhelm.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllerimage.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllerkustomize.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllernotification.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllersource.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllercore/configmaps/statusget · patch · updateLow
ClusterRole crd-controllercore/eventscreate · patchLow
ClusterRole crd-controllercore/namespacesget · list · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole crd-controllercore/serviceaccountsget · list · watchLow

⚠️ Potential Abuse (11)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentimage-reflector-controllermanagerghcr.io/fluxcd/image-reflector-controller:v0.35.1

🤖 kustomize-controller

Namespace: default  |  Automount:

🔑 Permissions (12)

RoleResourceVerbsRiskTags
ClusterRole crd-controllercore/configmapscreate · delete · get · list · patch · update · watchCriticalConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering
ClusterRole crd-controllercoordination.k8s.io/leasescreate · delete · get · list · patch · update · watchCriticalControlPlaneDisruption CriticalNamespace DenialOfService LeaderElectionAbuse Tampering
ClusterRole crd-controllercore/secretsget · list · watchCriticalClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess
ClusterRole crd-controllerhelm.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllerimage.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllerkustomize.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllernotification.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllersource.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllercore/configmaps/statusget · patch · updateLow
ClusterRole crd-controllercore/eventscreate · patchLow
ClusterRole crd-controllercore/namespacesget · list · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole crd-controllercore/serviceaccountsget · list · watchLow

⚠️ Potential Abuse (11)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentkustomize-controllermanagerghcr.io/fluxcd/kustomize-controller:v1.6.0

🤖 notification-controller

Namespace: default  |  Automount:

🔑 Permissions (12)

RoleResourceVerbsRiskTags
ClusterRole crd-controllercore/configmapscreate · delete · get · list · patch · update · watchCriticalConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering
ClusterRole crd-controllercoordination.k8s.io/leasescreate · delete · get · list · patch · update · watchCriticalControlPlaneDisruption CriticalNamespace DenialOfService LeaderElectionAbuse Tampering
ClusterRole crd-controllercore/secretsget · list · watchCriticalClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess
ClusterRole crd-controllerhelm.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllerimage.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllerkustomize.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllernotification.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllersource.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllercore/configmaps/statusget · patch · updateLow
ClusterRole crd-controllercore/eventscreate · patchLow
ClusterRole crd-controllercore/namespacesget · list · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole crd-controllercore/serviceaccountsget · list · watchLow

⚠️ Potential Abuse (11)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentnotification-controllermanagerghcr.io/fluxcd/notification-controller:v1.6.0

🤖 source-controller

Namespace: default  |  Automount:

🔑 Permissions (12)

RoleResourceVerbsRiskTags
ClusterRole crd-controllercore/configmapscreate · delete · get · list · patch · update · watchCriticalConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering
ClusterRole crd-controllercoordination.k8s.io/leasescreate · delete · get · list · patch · update · watchCriticalControlPlaneDisruption CriticalNamespace DenialOfService LeaderElectionAbuse Tampering
ClusterRole crd-controllercore/secretsget · list · watchCriticalClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess
ClusterRole crd-controllerhelm.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllerimage.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllerkustomize.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllernotification.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllersource.toolkit.fluxcd.io/**HighClusterWideAccess WildcardPermission
ClusterRole crd-controllercore/configmaps/statusget · patch · updateLow
ClusterRole crd-controllercore/eventscreate · patchLow
ClusterRole crd-controllercore/namespacesget · list · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole crd-controllercore/serviceaccountsget · list · watchLow

⚠️ Potential Abuse (11)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentsource-controllermanagerghcr.io/fluxcd/source-controller:v1.6.0

🤖 flux2-flux-check

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
Jobflux2-flux-checkflux-clighcr.io/fluxcd/flux-cli:v2.6.1