Description

Network Observability in Kubernetes based on eBPF.

Overview

IdentityNamespaceAutomountSecretsPermissionsWorkloadsRisk
netobserv-controller-managerdefault481Critical
netobserv-operator-grafanadefault25Critical
netobserv-operator-kube-pr-operatordefault371Critical
netobserv-operator-kube-state-metricsdefault322Critical
netobserv-operator-prometheus-serverdefault122Critical
netobserv-operator-promtaildefault51Critical
netobserv-operator-filebeatdefault51Low
netobserv-operator-fluent-bit-lokidefault21Low
netobserv-operator-grafana-testdefault12Low
netobserv-operator-kube-pr-admissiondefault32Low
netobserv-operator-kube-pr-prometheusdefault70Low
netobserv-operator-alertmanagerdefault01
netobserv-operator-kube-pr-alertmanagerdefault00
netobserv-operator-lokidefault01
netobserv-operator-prometheus-node-exporterdefault01
netobserv-operator-prometheus-pushgatewaydefault01
netobserv-operator-prometheus-windows-exporterdefault01

Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.


Identities

🤖 netobserv-controller-manager

Namespace: default  |  Automount:

🔑 Permissions (48)

RoleResourceVerbsRiskTags
ClusterRole netobserv-manager-rolecore/configmapscreate · delete · get · list · patch · update · watchCriticalConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering
ClusterRole netobserv-manager-roleapps/daemonsetscreate · delete · get · list · patch · update · watchCriticalNodeAccess Persistence PrivilegeEscalation Tampering WorkloadLifecycle
ClusterRole netobserv-manager-roleapps/deploymentscreate · delete · get · list · patch · update · watchCriticalPersistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle
Role netobserv-leader-election-rolecoordination.k8s.io/leasescreate · delete · get · list · patch · update · watchCriticalControlPlaneDisruption CriticalNamespace DenialOfService Tampering
ClusterRole netobserv-manager-rolenetworking.k8s.io/networkpoliciescreate · delete · get · list · patch · update · watchCriticalDenialOfService LateralMovement NetworkManipulation NetworkPolicyManagement Tampering
ClusterRole netobserv-manager-rolecore/secretscreate · delete · get · list · patch · update · watchCriticalClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure Persistence (+4 more)
ClusterRole netobserv-manager-rolecore/servicescreate · delete · get · list · patch · update · watchCriticalDenialOfService NetworkManipulation ServiceExposure Tampering
Role netobserv-leader-election-rolecore/configmapscreate · delete · get · list · patch · update · watchHighConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering
ClusterRole netobserv-manager-rolecore/namespacescreate · delete · get · list · patch · update · watchHighClusterStructure DenialOfService InformationDisclosure NamespaceLifecycle Reconnaissance (+1 more)
ClusterRole netobserv-manager-rolecore/serviceaccountscreate · delete · get · list · patch · update · watchHighIdentityManagement PotentialPrivilegeEscalation Tampering
ClusterRole netobserv-manager-rolerbac.authorization.k8s.io/clusterrolebindingscreate · delete · get · list · update · watchMediumInformationDisclosure RBACQuery Reconnaissance
ClusterRole netobserv-manager-rolerbac.authorization.k8s.io/rolebindingscreate · delete · get · list · update · watchMediumInformationDisclosure RBACQuery Reconnaissance
ClusterRole netobserv-manager-roleauthorization.k8s.io/subjectaccessreviewscreateMediumInformationDisclosure RBACQuery
ClusterRole netobserv-manager-roleauthentication.k8s.io/tokenreviewscreateMediumCredentialAccess InformationDisclosure RBACQuery
ClusterRole netobserv-manager-roleapiregistration.k8s.io/apiservicesget · list · watchLow
ClusterRole netobserv-manager-rolebpfman.io/clusterbpfapplicationscreate · delete · get · list · patch · update · watchLow
ClusterRole netobserv-manager-rolebpfman.io/clusterbpfapplications/statusget · patch · updateLow
ClusterRole netobserv-manager-rolek8s.ovn.org/clusteruserdefinednetworksget · list · watchLow
ClusterRole netobserv-manager-roleconfig.openshift.io/clusterversionsget · list · watchLow
ClusterRole netobserv-manager-roleconsole.openshift.io/consolepluginscreate · delete · get · list · patch · update · watchLow
ClusterRole netobserv-manager-roleoperator.openshift.io/consolesget · list · update · watchLow
ClusterRole netobserv-manager-roleapiextensions.k8s.io/customresourcedefinitionsget · list · watchLow
ClusterRole netobserv-manager-roleapiextensions.k8s.io/customresourcedefinitions/statuspatch · updateLow
ClusterRole netobserv-manager-rolecore/endpointsget · list · watchLow
ClusterRole netobserv-manager-rolediscovery.k8s.io/endpointslicesget · list · watchLow
Role netobserv-leader-election-rolecore/eventscreate · patchLow
ClusterRole netobserv-manager-roleflows.netobserv.io/flowcollectorscreate · delete · get · list · patch · update · watchLow
ClusterRole netobserv-manager-roleflows.netobserv.io/flowcollectors/finalizersupdateLow
ClusterRole netobserv-manager-roleflows.netobserv.io/flowcollectors/statusget · patch · updateLow
ClusterRole netobserv-manager-roleflows.netobserv.io/flowcollectorslicescreate · delete · get · list · patch · update · watchLow
ClusterRole netobserv-manager-roleflows.netobserv.io/flowcollectorslices/statusget · patch · updateLow
ClusterRole netobserv-manager-roleflows.netobserv.io/flowmetricscreate · delete · get · list · patch · update · watchLow
ClusterRole netobserv-manager-roleflows.netobserv.io/flowmetrics/statusget · patch · updateLow
ClusterRole netobserv-manager-roleautoscaling/horizontalpodautoscalerscreate · delete · get · list · patch · update · watchLow
ClusterRole netobserv-manager-roleloki.grafana.com/lokistacksget · list · watchLow
ClusterRole netobserv-manager-roleconfig.openshift.io/networksget · list · watchLow
ClusterRole netobserv-manager-roleoperator.openshift.io/networksget · list · watchLow
ClusterRole netobserv-manager-rolecore/nodesget · list · watchLow
ClusterRole netobserv-manager-rolecore/persistentvolumeclaimscreate · delete · get · list · patch · update · watchLow
ClusterRole netobserv-manager-rolecore/podsget · list · watchLow
ClusterRole netobserv-manager-rolemetrics.k8s.io/podscreateLow
ClusterRole netobserv-manager-rolemonitoring.coreos.com/prometheusrulescreate · delete · get · list · patch · update · watchLow
ClusterRole netobserv-manager-roleapps/replicasetsget · list · watchLow
ClusterRole netobserv-manager-rolesecurity.openshift.io/securitycontextconstraintscreate · list · update · watchLow
ClusterRole netobserv-manager-rolemonitoring.coreos.com/servicemonitorscreate · delete · get · list · patch · update · watchLow
ClusterRole netobserv-manager-rolek8s.ovn.org/userdefinednetworksget · list · watchLow
ClusterRole netobserv-manager-rolesecurity.openshift.io/securitycontextconstraints (restricted to: hostnetwork)useLowResourceNameRestricted
ClusterRole netobserv-manager-roleloki.grafana.com/network (restricted to: logs)createLowResourceNameRestricted

⚠️ Potential Abuse (25)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentnetobserv-controller-managermanagerquay.io/netobserv/network-observability-operator:1.11.2-community

🤖 netobserv-operator-kube-pr-operator

Namespace: default  |  Automount:

🔑 Permissions (37)

RoleResourceVerbsRiskTags
ClusterRole netobserv-operator-kube-pr-operatorcore/configmaps*CriticalClusterWideAccess ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation (+2 more)
ClusterRole netobserv-operator-kube-pr-operatorcore/secrets*CriticalClusterWideAccess ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure (+6 more)
ClusterRole netobserv-operator-kube-pr-operatorapps/statefulsets*CriticalClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more)
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/alertmanagerconfigs*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/alertmanagers*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/alertmanagers/finalizers*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/alertmanagers/status*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/podmonitors*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/podmonitors/status*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/probes*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/probes/status*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/prometheusagents*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/prometheusagents/finalizers*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/prometheusagents/status*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/prometheuses*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/prometheuses/finalizers*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/prometheuses/status*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/prometheusrules*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/prometheusrules/status*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/scrapeconfigs*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/scrapeconfigs/status*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/servicemonitors*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/servicemonitors/status*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/thanosrulers*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/thanosrulers/finalizers*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatormonitoring.coreos.com/thanosrulers/status*HighClusterWideAccess WildcardPermission
ClusterRole netobserv-operator-kube-pr-operatorcore/endpointscreate · delete · get · updateLow
ClusterRole netobserv-operator-kube-pr-operatordiscovery.k8s.io/endpointslicescreate · delete · get · list · update · watchLow
ClusterRole netobserv-operator-kube-pr-operatorcore/eventscreate · patchLow
ClusterRole netobserv-operator-kube-pr-operatorevents.k8s.io/eventscreate · patchLow
ClusterRole netobserv-operator-kube-pr-operatornetworking.k8s.io/ingressesget · list · watchLow
ClusterRole netobserv-operator-kube-pr-operatorcore/namespacesget · list · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole netobserv-operator-kube-pr-operatorcore/nodeslist · watchLow
ClusterRole netobserv-operator-kube-pr-operatorcore/podsdelete · listLow
ClusterRole netobserv-operator-kube-pr-operatorcore/servicescreate · delete · get · updateLow
ClusterRole netobserv-operator-kube-pr-operatorcore/services/finalizerscreate · delete · get · updateLow
ClusterRole netobserv-operator-kube-pr-operatorstorage.k8s.io/storageclassesgetLow

⚠️ Potential Abuse (13)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentnetobserv-operator-kube-pr-operatorkube-prometheus-stackquay.io/prometheus-operator/prometheus-operator:v0.87.1

🤖 netobserv-operator-kube-state-metrics

Namespace: default  |  Automount:

🔑 Permissions (32)

RoleResourceVerbsRiskTags
ClusterRole netobserv-operator-kube-state-metricscore/secretslist · watchCriticalClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess
ClusterRole netobserv-operator-kube-state-metricscore/configmapslist · watchHighConfigMapAccess DataExposure InformationDisclosure
ClusterRole netobserv-operator-kube-state-metricsadmissionregistration.k8s.io/mutatingwebhookconfigurationslist · watchMediumInformationDisclosure Reconnaissance WebhookReconnaissance
ClusterRole netobserv-operator-kube-state-metricscore/resourcequotaslist · watchMediumInformationDisclosure QuotaTampering Reconnaissance ResourceConfiguration
ClusterRole netobserv-operator-kube-state-metricsadmissionregistration.k8s.io/validatingwebhookconfigurationslist · watchMediumInformationDisclosure Reconnaissance WebhookReconnaissance
ClusterRole netobserv-operator-kube-state-metricscertificates.k8s.io/certificatesigningrequestslist · watchLow
ClusterRole netobserv-operator-kube-state-metricsbatch/cronjobslist · watchLow
ClusterRole netobserv-operator-kube-state-metricsapps/daemonsetslist · watchLow
ClusterRole netobserv-operator-kube-state-metricsextensions/daemonsetslist · watchLow
ClusterRole netobserv-operator-kube-state-metricsapps/deploymentslist · watchLow
ClusterRole netobserv-operator-kube-state-metricsextensions/deploymentslist · watchLow
ClusterRole netobserv-operator-kube-state-metricscore/endpointslist · watchLow
ClusterRole netobserv-operator-kube-state-metricsautoscaling/horizontalpodautoscalerslist · watchLow
ClusterRole netobserv-operator-kube-state-metricsextensions/ingresseslist · watchLow
ClusterRole netobserv-operator-kube-state-metricsnetworking.k8s.io/ingresseslist · watchLow
ClusterRole netobserv-operator-kube-state-metricsbatch/jobslist · watchLow
ClusterRole netobserv-operator-kube-state-metricscoordination.k8s.io/leaseslist · watchLow
ClusterRole netobserv-operator-kube-state-metricscore/limitrangeslist · watchLowInformationDisclosure Reconnaissance ResourceConfiguration
ClusterRole netobserv-operator-kube-state-metricscore/namespaceslist · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole netobserv-operator-kube-state-metricsnetworking.k8s.io/networkpolicieslist · watchLow
ClusterRole netobserv-operator-kube-state-metricscore/nodeslist · watchLow
ClusterRole netobserv-operator-kube-state-metricscore/persistentvolumeclaimslist · watchLow
ClusterRole netobserv-operator-kube-state-metricscore/persistentvolumeslist · watchLow
ClusterRole netobserv-operator-kube-state-metricspolicy/poddisruptionbudgetslist · watchLow
ClusterRole netobserv-operator-kube-state-metricscore/podslist · watchLow
ClusterRole netobserv-operator-kube-state-metricsapps/replicasetslist · watchLow
ClusterRole netobserv-operator-kube-state-metricsextensions/replicasetslist · watchLow
ClusterRole netobserv-operator-kube-state-metricscore/replicationcontrollerslist · watchLow
ClusterRole netobserv-operator-kube-state-metricscore/serviceslist · watchLow
ClusterRole netobserv-operator-kube-state-metricsapps/statefulsetslist · watchLow
ClusterRole netobserv-operator-kube-state-metricsstorage.k8s.io/storageclasseslist · watchLow
ClusterRole netobserv-operator-kube-state-metricsstorage.k8s.io/volumeattachmentslist · watchLow

⚠️ Potential Abuse (11)

The following security risks were found based on the above permissions:

📦 Workloads (2)

KindNameContainerImage
Deploymentnetobserv-operator-kube-state-metricskube-state-metricsregistry.k8s.io/kube-state-metrics/kube-state-metrics:v2.17.0
Deploymentnetobserv-operator-kube-state-metricskube-state-metricsregistry.k8s.io/kube-state-metrics/kube-state-metrics:v2.8.0

🤖 netobserv-operator-prometheus-server

Namespace: default  |  Automount:

🔑 Permissions (12)

RoleResourceVerbsRiskTags
ClusterRole netobserv-operator-prometheus-servercore/nodes/proxyget · list · watchCriticalAuthorizationBypass ClusterAdminAccess CodeExecution ElevationOfPrivilege LateralMovement (+1 more)
ClusterRole netobserv-operator-prometheus-servercore/configmapsget · list · watchHighConfigMapAccess DataExposure InformationDisclosure
ClusterRole netobserv-operator-prometheus-servercore/endpointsget · list · watchLow
ClusterRole netobserv-operator-prometheus-servercore/ingressesget · list · watchLow
ClusterRole netobserv-operator-prometheus-serverextensions/ingressesget · list · watchLow
ClusterRole netobserv-operator-prometheus-servernetworking.k8s.io/ingressesget · list · watchLow
ClusterRole netobserv-operator-prometheus-serverextensions/ingresses/statusget · list · watchLow
ClusterRole netobserv-operator-prometheus-servernetworking.k8s.io/ingresses/statusget · list · watchLow
ClusterRole netobserv-operator-prometheus-servercore/nodesget · list · watchLow
ClusterRole netobserv-operator-prometheus-servercore/nodes/metricsget · list · watchLow
ClusterRole netobserv-operator-prometheus-servercore/podsget · list · watchLow
ClusterRole netobserv-operator-prometheus-servercore/servicesget · list · watchLow

⚠️ Potential Abuse (4)

The following security risks were found based on the above permissions:

📦 Workloads (2)

KindNameContainerImage
Deploymentnetobserv-operator-prometheus-serverprometheus-serverquay.io/prometheus/prometheus:v2.41.0
Deploymentnetobserv-operator-prometheus-serverprometheus-server-configmap-reloadjimmidyson/configmap-reload:v0.8.0

🤖 netobserv-operator-promtail

Namespace: default  |  Automount:

🔑 Permissions (5)

RoleResourceVerbsRiskTags
ClusterRole netobserv-operator-promtailcore/nodes/proxyget · list · watchCriticalAuthorizationBypass ClusterAdminAccess CodeExecution ElevationOfPrivilege LateralMovement (+1 more)
ClusterRole netobserv-operator-promtailcore/endpointsget · list · watchLow
ClusterRole netobserv-operator-promtailcore/nodesget · list · watchLow
ClusterRole netobserv-operator-promtailcore/podsget · list · watchLow
ClusterRole netobserv-operator-promtailcore/servicesget · list · watchLow

⚠️ Potential Abuse (2)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
DaemonSetnetobserv-operator-promtailpromtaildocker.io/grafana/promtail:3.5.1

🤖 netobserv-operator-grafana

Namespace: default  |  Automount:

🔑 Permissions (2)

RoleResourceVerbsRiskTags
ClusterRole netobserv-operator-grafana-clusterrolecore/secretsget · list · watchCriticalClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess
ClusterRole netobserv-operator-grafana-clusterrolecore/configmapsget · list · watchHighConfigMapAccess DataExposure InformationDisclosure

⚠️ Potential Abuse (5)

The following security risks were found based on the above permissions:

📦 Workloads (5)

KindNameContainerImage
Deploymentnetobserv-operator-grafanagrafana/grafana/grafana:10.3.3
Deploymentnetobserv-operator-grafanagrafanadocker.io/grafana/grafana:12.3.0
Deploymentnetobserv-operator-grafanagrafana-sc-dashboardquay.io/kiwigrid/k8s-sidecar:2.1.2
Deploymentnetobserv-operator-grafanagrafana-sc-datasources/quay.io/kiwigrid/k8s-sidecar:1.19.2
Deploymentnetobserv-operator-grafanagrafana-sc-datasourcesquay.io/kiwigrid/k8s-sidecar:2.1.2

🤖 netobserv-operator-kube-pr-prometheus

Namespace: default  |  Automount:

🔑 Permissions (7)

RoleResourceVerbsRiskTags
ClusterRole netobserv-operator-kube-pr-prometheuscore/endpointsget · list · watchLow
ClusterRole netobserv-operator-kube-pr-prometheusdiscovery.k8s.io/endpointslicesget · list · watchLow
ClusterRole netobserv-operator-kube-pr-prometheusnetworking.k8s.io/ingressesget · list · watchLow
ClusterRole netobserv-operator-kube-pr-prometheuscore/nodesget · list · watchLow
ClusterRole netobserv-operator-kube-pr-prometheuscore/nodes/metricsget · list · watchLow
ClusterRole netobserv-operator-kube-pr-prometheuscore/podsget · list · watchLow
ClusterRole netobserv-operator-kube-pr-prometheuscore/servicesget · list · watchLow

⚠️ Potential Abuse (1)

The following security risks were found based on the above permissions:

📦 Workloads (0)

No workloads use this ServiceAccount.


🤖 netobserv-operator-filebeat

Namespace: default  |  Automount:

🔑 Permissions (5)

RoleResourceVerbsRiskTags
Role netobserv-operator-filebeat-rolecoordination.k8s.io/leasescreate · get · updateLow
ClusterRole netobserv-operator-filebeat-cluster-rolecore/namespacesget · list · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole netobserv-operator-filebeat-cluster-rolecore/nodesget · list · watchLow
ClusterRole netobserv-operator-filebeat-cluster-rolecore/podsget · list · watchLow
ClusterRole netobserv-operator-filebeat-cluster-roleapps/replicasetsget · list · watchLow

⚠️ Potential Abuse (2)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
DaemonSetnetobserv-operator-filebeatfilebeatdocker.elastic.co/beats/filebeat:7.17.3

🤖 netobserv-operator-kube-pr-admission

Namespace: default  |  Automount:

🔑 Permissions (3)

RoleResourceVerbsRiskTags
ClusterRole netobserv-operator-kube-pr-admissionadmissionregistration.k8s.io/mutatingwebhookconfigurationsget · patch · updateLow
Role netobserv-operator-kube-pr-admissioncore/secretscreate · getLow
ClusterRole netobserv-operator-kube-pr-admissionadmissionregistration.k8s.io/validatingwebhookconfigurationsget · patch · updateLow

⚠️ Potential Abuse (1)

The following security risks were found based on the above permissions:

📦 Workloads (2)

KindNameContainerImage
Jobnetobserv-operator-kube-pr-admission-createcreateghcr.io/jkroepke/kube-webhook-certgen:1.7.3
Jobnetobserv-operator-kube-pr-admission-patchpatchghcr.io/jkroepke/kube-webhook-certgen:1.7.3

🤖 netobserv-operator-fluent-bit-loki

Namespace: default  |  Automount:

🔑 Permissions (2)

RoleResourceVerbsRiskTags
ClusterRole netobserv-operator-fluent-bit-loki-clusterrolecore/namespacesget · list · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole netobserv-operator-fluent-bit-loki-clusterrolecore/podsget · list · watchLow

⚠️ Potential Abuse (2)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
DaemonSetnetobserv-operator-fluent-bit-lokifluent-bit-lokigrafana/fluent-bit-plugin-loki:2.1.0-amd64

🤖 netobserv-operator-grafana-test

Namespace: default  |  Automount:

🔑 Permissions (1)

RoleResourceVerbsRiskTags
Role netobserv-operator-grafana-testpolicy/podsecuritypolicies (restricted to: netobserv-operator-grafana-test)useLowResourceNameRestricted

⚠️ Potential Abuse (1)

The following security risks were found based on the above permissions:

📦 Workloads (2)

KindNameContainerImage
Podnetobserv-operator-grafana-testnetobserv-operator-testbats/bats:v1.4.1
Podnetobserv-operator-grafana-testnetobserv-operator-testdocker.io/bats/bats:v1.4.1

🤖 netobserv-operator-alertmanager

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
StatefulSetnetobserv-operator-alertmanageralertmanagerquay.io/prometheus/alertmanager:v0.25.0

🤖 netobserv-operator-kube-pr-alertmanager

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (0)

No workloads use this ServiceAccount.


🤖 netobserv-operator-loki

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
StatefulSetnetobserv-operator-lokilokigrafana/loki:2.6.1

🤖 netobserv-operator-prometheus-node-exporter

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
DaemonSetnetobserv-operator-prometheus-node-exporternode-exporterquay.io/prometheus/node-exporter:v1.10.2

🤖 netobserv-operator-prometheus-pushgateway

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
Deploymentnetobserv-operator-prometheus-pushgatewaypushgatewayprom/pushgateway:v1.5.1

🤖 netobserv-operator-prometheus-windows-exporter

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
DaemonSetnetobserv-operator-prometheus-windows-exporterwindows-exporterghcr.io/prometheus-community/windows-exporter:0.31.3