vcluster-pro-eks
v0.2.1-alpha.0
3 Service Accounts
3 Workloads
21 Bindings
1 Critical
6 High
2 Medium
12 Low
Description
vcluster-pro - Virtual Kubernetes Clusters (eks)
Overview
| Identity | Namespace | Automount | Secrets | Permissions | Workloads | Risk |
|---|---|---|---|---|---|---|
vc-vcluster-pro-eks | default | ❌ | — | 18 | 1 | Critical |
vcluster-pro-eks-job | default | ❌ | — | 3 | 1 | Low |
vc-workload-vcluster-pro-eks | default | ❌ | — | 0 | 0 | — |
Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.
Identities
🤖 vc-vcluster-pro-eks
Namespace: default | Automount: ❌
🔑 Permissions (18)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
Role vcluster-pro-eks | core/secrets | create · delete · get · list · patch · update · watch | Critical | CredentialAccess DataExposure InformationDisclosure Persistence PotentialPrivilegeEscalation (+2 more) |
Role vcluster-pro-eks | core/configmaps | create · delete · get · list · patch · update · watch | High | ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering |
Role vcluster-pro-eks | core/endpoints | create · delete · get · list · patch · update · watch | High | DenialOfService NetworkManipulation Tampering TrafficRedirection |
Role vcluster-pro-eks | core/pods | create · delete · get · list · patch · update · watch | High | LateralMovement Persistence PotentialPrivilegeEscalation Tampering WorkloadExecution |
Role vcluster-pro-eks | core/pods/attach | create · delete · get · list · patch · update · watch | High | CodeExecution LateralMovement PodAttach PotentialPrivilegeEscalation |
Role vcluster-pro-eks | core/pods/exec | create · delete · get · list · patch · update · watch | High | CodeExecution LateralMovement PodExec PotentialPrivilegeEscalation |
Role vcluster-pro-eks | core/services | create · delete · get · list · patch · update · watch | High | DenialOfService NetworkManipulation ServiceExposure Tampering |
Role vcluster-pro-eks | core/pods/log | get · list · watch | Medium | DataExposure InformationDisclosure LogAccess |
Role vcluster-pro-eks | core/pods/portforward | create · delete · get · list · patch · update · watch | Medium | LateralMovement NetworkManipulation PodPortForward |
Role vcluster-pro-eks | apps/deployments | get · list · watch | Low | |
Role vcluster-pro-eks | core/events | get · list · watch | Low | |
ClusterRole vc-vcluster-pro-eks-v-default | cluster.loft.sh/features | get · list · watch | Low | |
ClusterRole vc-vcluster-pro-eks-v-default | storage.loft.sh/features | get · list · watch | Low | |
Role vcluster-pro-eks | core/persistentvolumeclaims | create · delete · get · list · patch · update · watch | Low | |
Role vcluster-pro-eks | apps/replicasets | get · list · watch | Low | |
Role vcluster-pro-eks | apps/statefulsets | get · list · watch | Low | |
ClusterRole vc-vcluster-pro-eks-v-default | cluster.loft.sh/virtualclusters | get · list · watch | Low | |
ClusterRole vc-vcluster-pro-eks-v-default | storage.loft.sh/virtualclusters | get · list · watch | Low |
⚠️ Potential Abuse (13)
The following security risks were found based on the above permissions:
- Namespaced pod exec
- Namespaced pod attach
- Namespaced pod port-forward
- Create pods in a namespace
- Update/Patch pods in a namespace
- Read secrets in a namespace
- Modify secrets in a namespace
- Read pod logs in a namespace
- Read ConfigMaps in a namespace
- Modify ConfigMaps in a namespace
- Manage Endpoints or EndpointSlices in a namespace
- Manage Services in a namespace
📦 Workloads (1)
| Kind | Name | Container | Image |
|---|---|---|---|
| Deployment | vcluster-pro-eks | syncer | ghcr.io/loft-sh/vcluster-pro:0.2.1-alpha.0 |
🤖 vcluster-pro-eks-job
Namespace: default | Automount: ❌
🔑 Permissions (3)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
Role vcluster-pro-eks-job | core/configmaps | create · get · list | Low | |
Role vcluster-pro-eks-job | core/secrets | create · get · list | Low | |
Role vcluster-pro-eks-job | core/services | create · get · list | Low |
⚠️ Potential Abuse (1)
The following security risks were found based on the above permissions:
📦 Workloads (1)
| Kind | Name | Container | Image |
|---|---|---|---|
| Job | vcluster-pro-eks-job | certs | ghcr.io/loft-sh/vcluster-pro:0.2.1-alpha.0 |
🤖 vc-workload-vcluster-pro-eks
Namespace: default | Automount: ❌
🔑 Permissions (0)
No explicit RBAC bindings.
📦 Workloads (0)
No workloads use this ServiceAccount.