1 Service Accounts
1 Workloads
11 Bindings
1 Critical
10 Low
Description
Deploy the Bitwarden CRD Operator
Overview
Identity | Namespace | Automount | Secrets | Permissions | Workloads | Risk |
---|---|---|---|---|---|---|
bitwarden-crd-operator | default | ❌ | — | 11 | 1 | Critical |
Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.
Identities
🤖 bitwarden-crd-operator
Namespace: default
| Automount: ❌
🔑 Permissions (11)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole bitwarden-crd-operator-role | core/secrets | create · delete · get · list · patch · update · watch | Critical | ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure Persistence (+4 more) |
ClusterRole bitwarden-crd-operator-role | lerentis.uploadfilter24.eu/bitwarden-secrets | create · delete · get · list · patch · update · watch | Low | |
ClusterRole bitwarden-crd-operator-role | lerentis.uploadfilter24.eu/bitwarden-templates | create · delete · get · list · patch · update · watch | Low | |
ClusterRole bitwarden-crd-operator-role | apiextensions.k8s.io/customresourcedefinitions | list · watch | Low | |
ClusterRole bitwarden-crd-operator-role | core/events | create | Low | |
ClusterRole bitwarden-crd-operator-role | admissionregistration.k8s.io/v1/mutatingwebhookconfigurations | create · patch | Low | |
ClusterRole bitwarden-crd-operator-role | admissionregistration.k8s.io/v1beta1/mutatingwebhookconfigurations | create · patch | Low | |
ClusterRole bitwarden-crd-operator-role | core/namespaces | list · watch | Low | ClusterStructure InformationDisclosure Reconnaissance |
ClusterRole bitwarden-crd-operator-role | lerentis.uploadfilter24.eu/registry-credentials | create · delete · get · list · patch · update · watch | Low | |
ClusterRole bitwarden-crd-operator-role | admissionregistration.k8s.io/v1/validatingwebhookconfigurations | create · patch | Low | |
ClusterRole bitwarden-crd-operator-role | admissionregistration.k8s.io/v1beta1/validatingwebhookconfigurations | create · patch | Low |
⚠️ Potential Abuse (6)
The following security risks were found based on the above permissions:
- Read secrets cluster-wide
- Read secrets in a namespace
- Modify secrets cluster-wide
- Modify secrets in a namespace
- List Namespaces (Cluster Reconnaissance)
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | bitwarden-crd-operator | bitwarden-crd-operator | ghcr.io/lerentis/bitwarden-crd-operator:0.14.1 |