Description

Operator to manage NetBox resources directly through Kubernetes

Overview

IdentityNamespaceAutomountSecretsPermissionsWorkloadsRisk
netbox-operatordefault161Critical
netbox-operator-netbox-appdefault03
netbox-operator-postgresqldefault01
netbox-operator-redis-masterdefault01
netbox-operator-redis-replicadefault01

Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.


Identities

🤖 netbox-operator

Namespace: default  |  Automount:

🔑 Permissions (16)

RoleResourceVerbsRiskTags
Role netbox-operator-leader-electioncoordination.k8s.io/leasescreate · delete · get · list · patch · update · watchCriticalControlPlaneDisruption CriticalNamespace DenialOfService Tampering
Role netbox-operator-leader-electioncore/configmapscreate · delete · get · list · patch · update · watchHighConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering
ClusterRole netbox-operatorcore/eventscreate · patchLow
Role netbox-operator-leader-electioncore/eventscreate · patchLow
ClusterRole netbox-operatornetbox.dev/ipaddressclaimscreate · delete · get · list · patch · update · watchLow
ClusterRole netbox-operatornetbox.dev/ipaddressclaims/finalizersupdateLow
ClusterRole netbox-operatornetbox.dev/ipaddressclaims/statusget · patch · updateLow
ClusterRole netbox-operatornetbox.dev/ipaddressescreate · delete · get · list · patch · update · watchLow
ClusterRole netbox-operatornetbox.dev/ipaddresses/finalizersupdateLow
ClusterRole netbox-operatornetbox.dev/ipaddresses/statusget · patch · updateLow
ClusterRole netbox-operatornetbox.dev/prefixclaimscreate · delete · get · list · patch · update · watchLow
ClusterRole netbox-operatornetbox.dev/prefixclaims/finalizersupdateLow
ClusterRole netbox-operatornetbox.dev/prefixclaims/statusget · patch · updateLow
ClusterRole netbox-operatornetbox.dev/prefixescreate · delete · get · list · patch · update · watchLow
ClusterRole netbox-operatornetbox.dev/prefixes/finalizersupdateLow
ClusterRole netbox-operatornetbox.dev/prefixes/statusget · patch · updateLow

⚠️ Potential Abuse (4)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentnetbox-operatornetbox-operatorghcr.io/netbox-community/netbox-operator:v0.1.0-alpha.6

🤖 netbox-operator-netbox-app

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (3)

KindNameContainerImage
CronJobnetbox-operator-netbox-app-housekeepingnetbox-housekeepingghcr.io/netbox-community/netbox:v4.2.5
Deploymentnetbox-operator-netbox-appnetboxghcr.io/netbox-community/netbox:v4.2.5
Deploymentnetbox-operator-netbox-app-workernetbox-workerghcr.io/netbox-community/netbox:v4.2.5

🤖 netbox-operator-postgresql

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
StatefulSetnetbox-operator-postgresqlpostgresqldocker.io/bitnami/postgresql:17.4.0-debian-12-r10

🤖 netbox-operator-redis-master

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
StatefulSetnetbox-operator-redis-masterredisdocker.io/bitnami/redis:7.4.2-debian-12-r4

🤖 netbox-operator-redis-replica

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
StatefulSetnetbox-operator-redis-replicasredisdocker.io/bitnami/redis:7.4.2-debian-12-r4