1 Service Accounts
1 Workloads
22 Bindings
5 Critical
3 High
3 Medium
11 Low
Description
Kubernetes operator for managing Authorino instances, a K8s-native AuthN/AuthZ service to protect your APIs.
Overview
| Identity | Namespace | Automount | Secrets | Permissions | Workloads | Risk |
|---|---|---|---|---|---|---|
authorino-operator | default | ❌ | — | 22 | 1 | Critical |
Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.
Identities
🤖 authorino-operator
Namespace: default | Automount: ❌
🔑 Permissions (22)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
ClusterRole authorino-operator-manager | rbac.authorization.k8s.io/clusterrolebindings | create · delete · get · list · patch · update · watch | Critical | BindingToPrivilegedRole ClusterAdminAccess InformationDisclosure PrivilegeEscalation RBACManipulation (+2 more) |
ClusterRole authorino-operator-manager | core/configmaps | create · delete · get · list · patch · update · watch | Critical | ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering |
ClusterRole authorino-operator-manager | apps/deployments | create · delete · get · list · patch · update · watch | Critical | Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle |
Role authorino-operator-leader-election | coordination.k8s.io/leases | create · delete · get · list · patch · update · watch | Critical | ControlPlaneDisruption CriticalNamespace DenialOfService Tampering |
ClusterRole authorino-operator-manager | core/secrets | get · list · watch | Critical | ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess |
Role authorino-operator-leader-election | core/configmaps | create · delete · get · list · patch · update · watch | High | ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering |
ClusterRole authorino-operator-manager | rbac.authorization.k8s.io/rolebindings | create · delete · get · list · patch · update · watch | High | BindingToPrivilegedRole InformationDisclosure PrivilegeEscalation RBACManipulation RBACQuery (+1 more) |
ClusterRole authorino-operator-manager | rbac.authorization.k8s.io/roles | create · delete · get · list · patch · update · watch | High | InformationDisclosure PrivilegeEscalation RBACManipulation RBACQuery Reconnaissance |
ClusterRole authorino-operator-manager | rbac.authorization.k8s.io/clusterroles | create · get · list · update · watch | Medium | InformationDisclosure RBACQuery Reconnaissance |
ClusterRole authorino-operator-manager | authorization.k8s.io/subjectaccessreviews | create | Medium | InformationDisclosure RBACQuery |
ClusterRole authorino-operator-manager | authentication.k8s.io/tokenreviews | create | Medium | CredentialAccess InformationDisclosure RBACQuery |
ClusterRole authorino-operator-manager | authorino.kuadrant.io/authconfigs | create · delete · get · list · patch · update · watch | Low | |
ClusterRole authorino-operator-manager | authorino.kuadrant.io/authconfigs/status | get · patch · update | Low | |
ClusterRole authorino-operator-manager | operator.authorino.kuadrant.io/authorinos | create · delete · get · list · patch · update · watch | Low | |
ClusterRole authorino-operator-manager | operator.authorino.kuadrant.io/authorinos/finalizers | update | Low | |
ClusterRole authorino-operator-manager | operator.authorino.kuadrant.io/authorinos/status | get · patch · update | Low | |
ClusterRole authorino-operator-manager | core/configmaps/status | delete · get · patch · update | Low | |
ClusterRole authorino-operator-manager | core/events | create · patch | Low | |
Role authorino-operator-leader-election | core/events | create · patch | Low | |
ClusterRole authorino-operator-manager | coordination.k8s.io/leases | create · get · list · update | Low | |
ClusterRole authorino-operator-manager | core/serviceaccounts | create · get · list · patch · update · watch | Low | |
ClusterRole authorino-operator-manager | core/services | create · get · list · patch · update · watch | Low |
⚠️ Potential Abuse (16)
The following security risks were found based on the above permissions:
- Read secrets cluster-wide
- Read secrets in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Manage ClusterRoleBindings (create, update, patch, delete)
- Manage Roles in a namespace (create, update, patch, delete)
- Manage RoleBindings in a namespace (create, update, patch, delete)
- Manage Deployments cluster-wide (potential for privileged pod execution)
- Manage Deployments in a namespace (potential for privileged pod execution)
- Create TokenReviews (validate arbitrary tokens)
- Create SubjectAccessReviews (check arbitrary permissions)
- Read RBAC configuration cluster-wide
- Manage Leases in kube-system or kube-node-lease namespace
📦 Workloads (1)
| Kind | Name | Container | Image |
|---|---|---|---|
| Deployment | authorino-operator | manager | quay.io/kuadrant/authorino-operator:v0.23.0 |