Description

A Helm chart for Gatekeeper

Overview

IdentityNamespaceAutomountSecretsPermissionsWorkloadsRisk
gatekeeper-admindefault212Critical
gatekeeper-admin-upgrade-crdsdefault11Low
gatekeeper-update-namespace-labeldefault10Low

Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.


Identities

🤖 gatekeeper-admin

Namespace: default  |  Automount:

🔑 Permissions (21)

RoleResourceVerbsRiskTags
ClusterRole gatekeeper-manager-role*get · list · watchCriticalClusterStructure ClusterWideAccess ClusterWideLogAccess ClusterWideSecretAccess ConfigMapAccess (+15 more)
ClusterRole gatekeeper-manager-roleapiextensions.k8s.io/customresourcedefinitionscreate · delete · get · list · patch · update · watchCriticalCRDManipulation PotentialPrivilegeEscalation Tampering
Role gatekeeper-manager-rolecore/secretscreate · delete · get · list · patch · update · watchCriticalCredentialAccess DataExposure InformationDisclosure Persistence PotentialPrivilegeEscalation (+2 more)
ClusterRole gatekeeper-manager-roleconfig.gatekeeper.sh/*create · delete · get · list · patch · update · watchHighClusterWideAccess WildcardPermission
ClusterRole gatekeeper-manager-roleconnection.gatekeeper.sh/*create · delete · get · list · patch · update · watchHighClusterWideAccess WildcardPermission
ClusterRole gatekeeper-manager-roleconstraints.gatekeeper.sh/*create · delete · get · list · patch · update · watchHighClusterWideAccess WildcardPermission
ClusterRole gatekeeper-manager-roleexpansion.gatekeeper.sh/*create · delete · get · list · patch · update · watchHighClusterWideAccess WildcardPermission
ClusterRole gatekeeper-manager-rolemutations.gatekeeper.sh/*create · delete · get · list · patch · update · watchHighClusterWideAccess WildcardPermission
ClusterRole gatekeeper-manager-rolestatus.gatekeeper.sh/*create · delete · get · list · patch · update · watchHighClusterWideAccess WildcardPermission
ClusterRole gatekeeper-manager-roleconfig.gatekeeper.sh/configscreate · delete · get · list · patch · update · watchLow
ClusterRole gatekeeper-manager-roleconfig.gatekeeper.sh/configs/statusget · patch · updateLow
ClusterRole gatekeeper-manager-roletemplates.gatekeeper.sh/constrainttemplatescreate · delete · get · list · patch · update · watchLow
ClusterRole gatekeeper-manager-roletemplates.gatekeeper.sh/constrainttemplates/finalizersupdateLow
ClusterRole gatekeeper-manager-roletemplates.gatekeeper.sh/constrainttemplates/statusget · patch · updateLow
ClusterRole gatekeeper-manager-rolecore/eventscreate · patchLow
Role gatekeeper-manager-rolecore/eventscreate · patchLow
ClusterRole gatekeeper-manager-roleexternaldata.gatekeeper.sh/providerscreate · delete · get · list · patch · update · watchLow
ClusterRole gatekeeper-manager-roleadmissionregistration.k8s.io/validatingadmissionpoliciescreate · delete · get · list · patch · update · watchLow
ClusterRole gatekeeper-manager-roleadmissionregistration.k8s.io/validatingadmissionpolicybindingscreate · delete · get · list · patch · update · watchLow
ClusterRole gatekeeper-manager-roleadmissionregistration.k8s.io/mutatingwebhookconfigurations (restricted to: gatekeeper-mutating-webhook-configuration)get · list · patch · update · watchLowInformationDisclosure Reconnaissance ResourceNameRestricted WebhookReconnaissance
ClusterRole gatekeeper-manager-roleadmissionregistration.k8s.io/validatingwebhookconfigurations (restricted to: gatekeeper-validating-webhook-configuration)create · delete · get · list · patch · update · watchLowDenialOfService InformationDisclosure Reconnaissance ResourceNameRestricted Tampering (+2 more)

⚠️ Potential Abuse (23)

The following security risks were found based on the above permissions:

📦 Workloads (2)

KindNameContainerImage
Deploymentgatekeeper-auditmanageropenpolicyagent/gatekeeper:v3.21.0-beta.0
Deploymentgatekeeper-controller-managermanageropenpolicyagent/gatekeeper:v3.21.0-beta.0

🤖 gatekeeper-admin-upgrade-crds

Namespace: default  |  Automount:

🔑 Permissions (1)

RoleResourceVerbsRiskTags
ClusterRole gatekeeper-admin-upgrade-crdsapiextensions.k8s.io/customresourcedefinitionscreate · get · patch · updateLow

⚠️ Potential Abuse (1)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Jobgatekeeper-update-crds-hookcrds-upgradeopenpolicyagent/gatekeeper-crds:v3.21.0-beta.0

🤖 gatekeeper-update-namespace-label

Namespace: default  |  Automount:

🔑 Permissions (1)

RoleResourceVerbsRiskTags
ClusterRole gatekeeper-update-namespace-labelcore/namespaces (restricted to: default)get · patch · updateLowResourceNameRestricted

⚠️ Potential Abuse (1)

The following security risks were found based on the above permissions:

📦 Workloads (0)

No workloads use this ServiceAccount.