Description

Netchecks proactively verifies whether your security controls are working as intended.

Overview

IdentityNamespaceAutomountSecretsPermissionsWorkloadsRisk
netcheck-operatordefault91Critical
netchecks-kyverno-plugindefault71High
netchecks-policy-reporterdefault51High
netchecks-uidefault11Low

Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.


Identities

🤖 netcheck-operator

Namespace: default  |  Automount:

🔑 Permissions (9)

RoleResourceVerbsRiskTags
ClusterRole netcheckscore/configmapscreate · delete · get · list · patch · updateCriticalConfigMapAccess PotentialPrivilegeEscalation Tampering
ClusterRole netchecksbatch/cronjobscreate · delete · get · list · patch · update · watchCriticalPersistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle
ClusterRole netchecksbatch/jobscreate · delete · get · list · patch · update · watchCriticalPotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle
ClusterRole netcheckscore/pods/logget · listHighClusterWideLogAccess DataExposure InformationDisclosure LogAccess
ClusterRole netcheckscore/eventscreateLow
ClusterRole netchecksnetchecks.io/networkassertionsget · list · patch · update · watchLow
ClusterRole netchecksnetchecks.io/networkassertions/statuspatch · updateLow
ClusterRole netcheckscore/podsget · list · watchLow
ClusterRole netcheckswgpolicyk8s.io/policyreportscreate · get · list · patch · update · watchLow

⚠️ Potential Abuse (9)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentnetchecksnetchecksghcr.io/hardbyte/netchecks-operator:0.7.0

🤖 netchecks-kyverno-plugin

Namespace: default  |  Automount:

🔑 Permissions (7)

RoleResourceVerbsRiskTags
ClusterRole netchecks-kyverno-plugin*/clusterpoliciesget · list · watchHighClusterWideAccess WildcardPermission
ClusterRole netchecks-kyverno-plugin*/clusterpolicies/statusget · list · watchHighClusterWideAccess WildcardPermission
ClusterRole netchecks-kyverno-plugin*/clusterpolicyreportsget · listHighClusterWideAccess WildcardPermission
ClusterRole netchecks-kyverno-plugin*/policiesget · list · watchHighClusterWideAccess WildcardPermission
ClusterRole netchecks-kyverno-plugin*/policies/statusget · list · watchHighClusterWideAccess WildcardPermission
ClusterRole netchecks-kyverno-plugin*/policyreportsget · listHighClusterWideAccess WildcardPermission
Role netchecks-kyverno-plugin-secret-readercore/secretsgetLow

⚠️ Potential Abuse (2)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentnetchecks-kyverno-pluginkyverno-pluginghcr.io/kyverno/policy-reporter-kyverno-plugin:1.6.3

🤖 netchecks-policy-reporter

Namespace: default  |  Automount:

🔑 Permissions (5)

RoleResourceVerbsRiskTags
ClusterRole netchecks-policy-reporter*/clusterpolicyreportsget · list · watchHighClusterWideAccess WildcardPermission
ClusterRole netchecks-policy-reporter*/clusterpolicyreports/statusget · list · watchHighClusterWideAccess WildcardPermission
ClusterRole netchecks-policy-reporter*/policyreportsget · list · watchHighClusterWideAccess WildcardPermission
ClusterRole netchecks-policy-reporter*/policyreports/statusget · list · watchHighClusterWideAccess WildcardPermission
Role netchecks-policy-reporter-secret-readercore/secretsgetLow

⚠️ Potential Abuse (2)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentnetchecks-policy-reporterpolicy-reporterghcr.io/kyverno/policy-reporter:2.18.1

🤖 netchecks-ui

Namespace: default  |  Automount:

🔑 Permissions (1)

RoleResourceVerbsRiskTags
Role netchecks-ui-secret-readercore/secretsgetLow

⚠️ Potential Abuse (1)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentnetchecks-uiuighcr.io/kyverno/policy-reporter-ui:1.9.2