Description

Netchecks proactively verifies whether your security controls are working as intended.

Overview

IdentityNamespaceAutomountSecretsPermissionsWorkloadsRisk
netcheck-operatordefault181Critical
netchecks-kyverno-plugindefault71High
netchecks-policy-reporterdefault51High
netchecks-uidefault11Low

Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.


Identities

🤖 netcheck-operator

Namespace: default  |  Automount:

🔑 Permissions (18)

RoleResourceVerbsRiskTags
ClusterRole netcheckscore/configmapscreate · delete · get · list · patch · updateCriticalConfigMapAccess PotentialPrivilegeEscalation Tampering
ClusterRole netcheckscore/pods/logget · list · watchHighClusterWideLogAccess DataExposure InformationDisclosure LogAccess
ClusterRole netcheckskopf.dev/clusterkopfpeeringsget · list · patch · watchLow
ClusterRole netchecksbatch/cronjobscreate · delete · get · list · updateLow
ClusterRole netchecksextensions/cronjobscreate · delete · get · list · updateLow
ClusterRole netchecksapiextensions.k8s.io/customresourcedefinitionslist · watchLow
ClusterRole netcheckscore/eventscreateLow
ClusterRole netchecksbatch/jobscreate · delete · get · list · updateLow
ClusterRole netchecksextensions/jobscreate · delete · get · list · updateLow
ClusterRole netchecksadmissionregistration.k8s.io/v1/mutatingwebhookconfigurationscreate · patchLow
ClusterRole netchecksadmissionregistration.k8s.io/v1beta1/mutatingwebhookconfigurationscreate · patchLow
ClusterRole netcheckscore/namespaceslist · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole netchecksnetchecks.io/networkassertionsget · list · patch · update · watchLow
ClusterRole netcheckscore/podsget · list · patch · watchLow
ClusterRole netcheckscore/pods/statusget · patchLow
ClusterRole netcheckswgpolicyk8s.io/policyreportscreate · get · list · patch · update · watchLow
ClusterRole netchecksadmissionregistration.k8s.io/v1/validatingwebhookconfigurationscreate · patchLow
ClusterRole netchecksadmissionregistration.k8s.io/v1beta1/validatingwebhookconfigurationscreate · patchLow

⚠️ Potential Abuse (6)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentnetchecksnetchecksghcr.io/hardbyte/netchecks-operator:0.5.6

🤖 netchecks-kyverno-plugin

Namespace: default  |  Automount:

🔑 Permissions (7)

RoleResourceVerbsRiskTags
ClusterRole netchecks-kyverno-plugin*/clusterpoliciesget · list · watchHighClusterWideAccess WildcardPermission
ClusterRole netchecks-kyverno-plugin*/clusterpolicies/statusget · list · watchHighClusterWideAccess WildcardPermission
ClusterRole netchecks-kyverno-plugin*/clusterpolicyreportsget · listHighClusterWideAccess WildcardPermission
ClusterRole netchecks-kyverno-plugin*/policiesget · list · watchHighClusterWideAccess WildcardPermission
ClusterRole netchecks-kyverno-plugin*/policies/statusget · list · watchHighClusterWideAccess WildcardPermission
ClusterRole netchecks-kyverno-plugin*/policyreportsget · listHighClusterWideAccess WildcardPermission
Role netchecks-kyverno-plugin-secret-readercore/secretsgetLow

⚠️ Potential Abuse (2)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentnetchecks-kyverno-pluginkyverno-pluginghcr.io/kyverno/policy-reporter-kyverno-plugin:1.6.3

🤖 netchecks-policy-reporter

Namespace: default  |  Automount:

🔑 Permissions (5)

RoleResourceVerbsRiskTags
ClusterRole netchecks-policy-reporter*/clusterpolicyreportsget · list · watchHighClusterWideAccess WildcardPermission
ClusterRole netchecks-policy-reporter*/clusterpolicyreports/statusget · list · watchHighClusterWideAccess WildcardPermission
ClusterRole netchecks-policy-reporter*/policyreportsget · list · watchHighClusterWideAccess WildcardPermission
ClusterRole netchecks-policy-reporter*/policyreports/statusget · list · watchHighClusterWideAccess WildcardPermission
Role netchecks-policy-reporter-secret-readercore/secretsgetLow

⚠️ Potential Abuse (2)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentnetchecks-policy-reporterpolicy-reporterghcr.io/kyverno/policy-reporter:2.18.1

🤖 netchecks-ui

Namespace: default  |  Automount:

🔑 Permissions (1)

RoleResourceVerbsRiskTags
Role netchecks-ui-secret-readercore/secretsgetLow

⚠️ Potential Abuse (1)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentnetchecks-uiuighcr.io/kyverno/policy-reporter-ui:1.9.2