Description

HiveMQ Operator (legacy)

Overview

IdentityNamespaceAutomountSecretsPermissionsWorkloadsRisk
hivemq-operator-grafanadefault23Critical
hivemq-operator-kube-prome-operatordefault211Critical
hivemq-operator-operatordefault251Critical
hivemq-operator-kube-state-metricsdefault311Medium
hivemq-operator-admissiondefault32Low
hivemq-operator-kube-prome-admissiondefault32Low
hivemq-operator-kube-prome-prometheusdefault60Low
hivemq-operator-grafana-testdefault01
hivemq-operator-hivemqdefault00
hivemq-operator-kube-prome-alertmanagerdefault00
hivemq-operator-prometheus-node-exporterdefault01

Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.


Identities

🤖 hivemq-operator-operator

Namespace: default  |  Automount:

🔑 Permissions (25)

RoleResourceVerbsRiskTags
ClusterRole hivemq-operator-operatorcore/configmapscreate · delete · get · list · patch · update · watchCriticalConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering
ClusterRole hivemq-operator-operatorapiextensions.k8s.io/customresourcedefinitionscreate · delete · get · list · patch · updateCriticalCRDManipulation PotentialPrivilegeEscalation Tampering
ClusterRole hivemq-operator-operatorapps/daemonsetscreate · delete · get · list · patch · update · watchCriticalNodeAccess Persistence PrivilegeEscalation Tampering WorkloadLifecycle
ClusterRole hivemq-operator-operatorapps/deploymentscreate · delete · get · list · patch · update · watchCriticalPersistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle
ClusterRole hivemq-operator-operatorcore/podscreate · delete · get · list · patch · update · watchCriticalLateralMovement Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+1 more)
ClusterRole hivemq-operator-operatorcore/pods/attachcreate · delete · get · list · patch · update · watchCriticalClusterWidePodAttach CodeExecution ElevationOfPrivilege LateralMovement PodAttach (+1 more)
ClusterRole hivemq-operator-operatorcore/pods/execcreate · delete · get · list · patch · update · watchCriticalClusterWidePodExec CodeExecution ElevationOfPrivilege LateralMovement PodExec (+1 more)
ClusterRole hivemq-operator-operatorcore/servicescreate · delete · get · list · patch · update · watchCriticalDenialOfService NetworkManipulation ServiceExposure Tampering
ClusterRole hivemq-operator-operatorapps/statefulsetscreate · delete · get · list · patch · update · watchCriticalPersistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle
ClusterRole hivemq-operator-operatoradmissionregistration.k8s.io/validatingwebhookconfigurationscreate · delete · get · list · patch · update · watchCriticalDenialOfService InformationDisclosure Reconnaissance Tampering WebhookManipulation (+1 more)
ClusterRole hivemq-operator-operatorcore/pods/portforwardcreate · delete · get · list · patch · update · watchHighClusterWidePodPortForward LateralMovement NetworkManipulation PodPortForward
ClusterRole hivemq-operator-operatorapiextensions.k8s.io/customresourcedefinitions/finalizerscreate · delete · get · list · patch · updateLow
ClusterRole hivemq-operator-operatorextensions/daemonsetscreate · delete · get · list · patch · update · watchLow
ClusterRole hivemq-operator-operatorextensions/deploymentscreate · delete · get · list · patch · update · watchLow
ClusterRole hivemq-operator-operatorcore/eventscreate · delete · get · patch · updateLow
ClusterRole hivemq-operator-operatorhivemq.com/hivemq-clusterscreate · delete · get · list · patch · update · watchLow
ClusterRole hivemq-operator-operatorhivemq.com/hivemq-clusters/finalizerscreate · delete · get · list · patch · update · watchLow
ClusterRole hivemq-operator-operatorhivemq.com/hivemq-clusters/scalecreate · delete · get · list · patch · update · watchLow
ClusterRole hivemq-operator-operatorhivemq.com/hivemq-clusters/statuscreate · delete · get · list · patch · update · watchLow
ClusterRole hivemq-operator-operatorcore/persistentvolumeclaimscreate · delete · get · patch · updateLow
ClusterRole hivemq-operator-operatorcore/pods/proxycreate · delete · get · list · patch · update · watchLow
ClusterRole hivemq-operator-operatorcore/secretslistLow
ClusterRole hivemq-operator-operatormonitoring.coreos.com/servicemonitorscreate · delete · get · list · patch · update · watchLow
ClusterRole hivemq-operator-operatorcore/services/proxycreate · delete · get · list · patch · update · watchLow
ClusterRole hivemq-operator-operatorextensions/statefulsetscreate · delete · get · list · patch · update · watchLow

⚠️ Potential Abuse (26)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymenthivemq-operator-operatoroperatorhivemq/hivemq-operator:4.7.10

🤖 hivemq-operator-kube-prome-operator

Namespace: default  |  Automount:

🔑 Permissions (21)

RoleResourceVerbsRiskTags
ClusterRole hivemq-operator-kube-prome-operatorcore/configmaps*CriticalClusterWideAccess ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation (+2 more)
ClusterRole hivemq-operator-kube-prome-operatorcore/secrets*CriticalClusterWideAccess ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure (+6 more)
ClusterRole hivemq-operator-kube-prome-operatorapps/statefulsets*CriticalClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more)
ClusterRole hivemq-operator-kube-prome-operatormonitoring.coreos.com/alertmanagerconfigs*HighClusterWideAccess WildcardPermission
ClusterRole hivemq-operator-kube-prome-operatormonitoring.coreos.com/alertmanagers*HighClusterWideAccess WildcardPermission
ClusterRole hivemq-operator-kube-prome-operatormonitoring.coreos.com/alertmanagers/finalizers*HighClusterWideAccess WildcardPermission
ClusterRole hivemq-operator-kube-prome-operatormonitoring.coreos.com/podmonitors*HighClusterWideAccess WildcardPermission
ClusterRole hivemq-operator-kube-prome-operatormonitoring.coreos.com/probes*HighClusterWideAccess WildcardPermission
ClusterRole hivemq-operator-kube-prome-operatormonitoring.coreos.com/prometheuses*HighClusterWideAccess WildcardPermission
ClusterRole hivemq-operator-kube-prome-operatormonitoring.coreos.com/prometheuses/finalizers*HighClusterWideAccess WildcardPermission
ClusterRole hivemq-operator-kube-prome-operatormonitoring.coreos.com/prometheusrules*HighClusterWideAccess WildcardPermission
ClusterRole hivemq-operator-kube-prome-operatormonitoring.coreos.com/servicemonitors*HighClusterWideAccess WildcardPermission
ClusterRole hivemq-operator-kube-prome-operatormonitoring.coreos.com/thanosrulers*HighClusterWideAccess WildcardPermission
ClusterRole hivemq-operator-kube-prome-operatormonitoring.coreos.com/thanosrulers/finalizers*HighClusterWideAccess WildcardPermission
ClusterRole hivemq-operator-kube-prome-operatorcore/endpointscreate · delete · get · updateLow
ClusterRole hivemq-operator-kube-prome-operatornetworking.k8s.io/ingressesget · list · watchLow
ClusterRole hivemq-operator-kube-prome-operatorcore/namespacesget · list · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole hivemq-operator-kube-prome-operatorcore/nodeslist · watchLow
ClusterRole hivemq-operator-kube-prome-operatorcore/podsdelete · listLow
ClusterRole hivemq-operator-kube-prome-operatorcore/servicescreate · delete · get · updateLow
ClusterRole hivemq-operator-kube-prome-operatorcore/services/finalizerscreate · delete · get · updateLow

⚠️ Potential Abuse (13)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymenthivemq-operator-kube-prome-operatorkube-prometheus-stackquay.io/prometheus-operator/prometheus-operator:v0.53.1

🤖 hivemq-operator-grafana

Namespace: default  |  Automount:

🔑 Permissions (2)

RoleResourceVerbsRiskTags
ClusterRole hivemq-operator-grafana-clusterrolecore/secretsget · list · watchCriticalClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess
ClusterRole hivemq-operator-grafana-clusterrolecore/configmapsget · list · watchHighConfigMapAccess DataExposure InformationDisclosure

⚠️ Potential Abuse (5)

The following security risks were found based on the above permissions:

📦 Workloads (3)

KindNameContainerImage
Deploymenthivemq-operator-grafanagrafanagrafana/grafana:8.3.4
Deploymenthivemq-operator-grafanagrafana-sc-dashboardquay.io/kiwigrid/k8s-sidecar:1.15.1
Deploymenthivemq-operator-grafanagrafana-sc-datasourcesquay.io/kiwigrid/k8s-sidecar:1.15.1

🤖 hivemq-operator-kube-state-metrics

Namespace: default  |  Automount:

🔑 Permissions (31)

RoleResourceVerbsRiskTags
ClusterRole hivemq-operator-kube-state-metricsadmissionregistration.k8s.io/mutatingwebhookconfigurationslist · watchMediumInformationDisclosure Reconnaissance WebhookReconnaissance
ClusterRole hivemq-operator-kube-state-metricsadmissionregistration.k8s.io/validatingwebhookconfigurationslist · watchMediumInformationDisclosure Reconnaissance WebhookReconnaissance
ClusterRole hivemq-operator-kube-state-metricscertificates.k8s.io/certificatesigningrequestslist · watchLow
ClusterRole hivemq-operator-kube-state-metricscore/configmapslist · watchLow
ClusterRole hivemq-operator-kube-state-metricsbatch/cronjobslist · watchLow
ClusterRole hivemq-operator-kube-state-metricsapps/daemonsetslist · watchLow
ClusterRole hivemq-operator-kube-state-metricsextensions/daemonsetslist · watchLow
ClusterRole hivemq-operator-kube-state-metricsapps/deploymentslist · watchLow
ClusterRole hivemq-operator-kube-state-metricsextensions/deploymentslist · watchLow
ClusterRole hivemq-operator-kube-state-metricscore/endpointslist · watchLow
ClusterRole hivemq-operator-kube-state-metricsautoscaling/horizontalpodautoscalerslist · watchLow
ClusterRole hivemq-operator-kube-state-metricsextensions/ingresseslist · watchLow
ClusterRole hivemq-operator-kube-state-metricsnetworking.k8s.io/ingresseslist · watchLow
ClusterRole hivemq-operator-kube-state-metricsbatch/jobslist · watchLow
ClusterRole hivemq-operator-kube-state-metricscore/limitrangeslist · watchLow
ClusterRole hivemq-operator-kube-state-metricscore/namespaceslist · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole hivemq-operator-kube-state-metricsnetworking.k8s.io/networkpolicieslist · watchLow
ClusterRole hivemq-operator-kube-state-metricscore/nodeslist · watchLow
ClusterRole hivemq-operator-kube-state-metricscore/persistentvolumeclaimslist · watchLow
ClusterRole hivemq-operator-kube-state-metricscore/persistentvolumeslist · watchLow
ClusterRole hivemq-operator-kube-state-metricspolicy/poddisruptionbudgetslist · watchLow
ClusterRole hivemq-operator-kube-state-metricscore/podslist · watchLow
ClusterRole hivemq-operator-kube-state-metricsapps/replicasetslist · watchLow
ClusterRole hivemq-operator-kube-state-metricsextensions/replicasetslist · watchLow
ClusterRole hivemq-operator-kube-state-metricscore/replicationcontrollerslist · watchLow
ClusterRole hivemq-operator-kube-state-metricscore/resourcequotaslist · watchLow
ClusterRole hivemq-operator-kube-state-metricscore/secretslist · watchLow
ClusterRole hivemq-operator-kube-state-metricscore/serviceslist · watchLow
ClusterRole hivemq-operator-kube-state-metricsapps/statefulsetslist · watchLow
ClusterRole hivemq-operator-kube-state-metricsstorage.k8s.io/storageclasseslist · watchLow
ClusterRole hivemq-operator-kube-state-metricsstorage.k8s.io/volumeattachmentslist · watchLow

⚠️ Potential Abuse (4)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymenthivemq-operator-kube-state-metricskube-state-metricsk8s.gcr.io/kube-state-metrics/kube-state-metrics:v2.3.0

🤖 hivemq-operator-kube-prome-prometheus

Namespace: default  |  Automount:

🔑 Permissions (6)

RoleResourceVerbsRiskTags
ClusterRole hivemq-operator-kube-prome-prometheuscore/endpointsget · list · watchLow
ClusterRole hivemq-operator-kube-prome-prometheusnetworking.k8s.io/ingressesget · list · watchLow
ClusterRole hivemq-operator-kube-prome-prometheuscore/nodesget · list · watchLow
ClusterRole hivemq-operator-kube-prome-prometheuscore/nodes/metricsget · list · watchLow
ClusterRole hivemq-operator-kube-prome-prometheuscore/podsget · list · watchLow
ClusterRole hivemq-operator-kube-prome-prometheuscore/servicesget · list · watchLow

⚠️ Potential Abuse (1)

The following security risks were found based on the above permissions:

📦 Workloads (0)

No workloads use this ServiceAccount.


🤖 hivemq-operator-admission

Namespace: default  |  Automount:

🔑 Permissions (3)

RoleResourceVerbsRiskTags
ClusterRole hivemq-operator-admissionadmissionregistration.k8s.io/mutatingwebhookconfigurationsget · updateLow
Role hivemq-operator-admissioncore/secretscreate · getLow
ClusterRole hivemq-operator-admissionadmissionregistration.k8s.io/validatingwebhookconfigurationsget · updateLow

⚠️ Potential Abuse (1)

The following security risks were found based on the above permissions:

📦 Workloads (2)

KindNameContainerImage
Jobhivemq-operator-admission-createcreateregistry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.1.1
Jobhivemq-operator-admission-patchpatchregistry.k8s.io/ingress-nginx/kube-webhook-certgen:v1.1.1

🤖 hivemq-operator-kube-prome-admission

Namespace: default  |  Automount:

🔑 Permissions (3)

RoleResourceVerbsRiskTags
ClusterRole hivemq-operator-kube-prome-admissionadmissionregistration.k8s.io/mutatingwebhookconfigurationsget · updateLow
Role hivemq-operator-kube-prome-admissioncore/secretscreate · getLow
ClusterRole hivemq-operator-kube-prome-admissionadmissionregistration.k8s.io/validatingwebhookconfigurationsget · updateLow

⚠️ Potential Abuse (1)

The following security risks were found based on the above permissions:

📦 Workloads (2)

KindNameContainerImage
Jobhivemq-operator-kube-prome-admission-createcreatek8s.gcr.io/ingress-nginx/kube-webhook-certgen:v1.0@sha256:f3b6b39a6062328c095337b4cadcefd1612348fdd5190b1dcbcb9b9e90bd8068
Jobhivemq-operator-kube-prome-admission-patchpatchk8s.gcr.io/ingress-nginx/kube-webhook-certgen:v1.0@sha256:f3b6b39a6062328c095337b4cadcefd1612348fdd5190b1dcbcb9b9e90bd8068

🤖 hivemq-operator-grafana-test

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
Podhivemq-operator-grafana-testhivemq-operator-testbats/bats:v1.4.1

🤖 hivemq-operator-hivemq

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (0)

No workloads use this ServiceAccount.


🤖 hivemq-operator-kube-prome-alertmanager

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (0)

No workloads use this ServiceAccount.


🤖 hivemq-operator-prometheus-node-exporter

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
DaemonSethivemq-operator-prometheus-node-exporternode-exporterquay.io/prometheus/node-exporter:v1.3.1