kafka-operator
v0.2.0
1 Service Accounts
1 Workloads
10 Bindings
3 Critical
3 High
4 Low
Description
The Kubedoop operator for Apache Kafka
Overview
Identity | Namespace | Automount | Secrets | Permissions | Workloads | Risk |
---|---|---|---|---|---|---|
kafka-operator | default | ✅ | — | 10 | 1 | Critical |
Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.
Identities
🤖 kafka-operator
Namespace: default
| Automount: ✅
🔑 Permissions (10)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole kafka-operator | core/configmaps | create · delete · get · list · patch · update · watch | Critical | ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering |
ClusterRole kafka-operator | core/services | create · delete · get · list · patch · update · watch | Critical | DenialOfService NetworkManipulation ServiceExposure Tampering |
ClusterRole kafka-operator | apps/statefulsets | create · delete · get · list · patch · update · watch | Critical | Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle |
ClusterRole kafka-operator | rbac.authorization.k8s.io/rolebindings | create · delete · get · list · patch · update · watch | High | BindingToPrivilegedRole InformationDisclosure PrivilegeEscalation RBACManipulation RBACQuery (+1 more) |
ClusterRole kafka-operator | rbac.authorization.k8s.io/roles | create · delete · get · list · patch · update · watch | High | InformationDisclosure PrivilegeEscalation RBACManipulation RBACQuery Reconnaissance |
ClusterRole kafka-operator | core/serviceaccounts | create · delete · get · list · patch · update · watch | High | IdentityManagement PotentialPrivilegeEscalation Tampering |
ClusterRole kafka-operator | kafka.kubedoop.dev/kafkaclusters | create · delete · get · list · patch · update · watch | Low | |
ClusterRole kafka-operator | kafka.kubedoop.dev/kafkaclusters/finalizers | update | Low | |
ClusterRole kafka-operator | kafka.kubedoop.dev/kafkaclusters/status | get · patch · update | Low | |
ClusterRole kafka-operator | core/pods | get · list · watch | Low |
⚠️ Potential Abuse (14)
The following security risks were found based on the above permissions:
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Manage Roles in a namespace (create, update, patch, delete)
- Manage RoleBindings in a namespace (create, update, patch, delete)
- Manage StatefulSets cluster-wide
- Manage StatefulSets in a namespace
- Manage ServiceAccounts cluster-wide
- Manage ServiceAccounts in a namespace
- Manage Services cluster-wide
- Manage Services in a namespace
- Read RBAC configuration cluster-wide
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | kafka-operator | kafka-operator | quay.io/zncdatadev/kafka-operator:0.2.0 |