openebs
Description
Containerized Attached Storage for Kubernetes
Overview
Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.
Identities
🤖 openebs
Namespace: default
| Automount: ❌
🔑 Permissions (36)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole openebs | */configmaps | * | Critical | ClusterWideAccess ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation (+2 more) |
ClusterRole openebs | */cronjobs | * | Critical | ClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more) |
ClusterRole openebs | apiextensions.k8s.io/customresourcedefinitions | create · delete · get · list · patch · update | Critical | CRDManipulation PotentialPrivilegeEscalation Tampering |
ClusterRole openebs | */daemonsets | * | Critical | ClusterWideAccess NodeAccess Persistence PrivilegeEscalation Tampering (+2 more) |
ClusterRole openebs | */deployments | * | Critical | ClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more) |
ClusterRole openebs | */endpoints | * | Critical | ClusterWideAccess DenialOfService ManInTheMiddle NetworkManipulation Tampering (+2 more) |
ClusterRole openebs | */jobs | * | Critical | ClusterWideAccess PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+1 more) |
ClusterRole openebs | admissionregistration.k8s.io/mutatingwebhookconfigurations | create · delete · get · list · patch · update | Critical | DenialOfService PrivilegeEscalation Tampering WebhookManipulation |
ClusterRole openebs | */nodes | * | Critical | ClusterWideAccess DenialOfService NodeAccess PotentialPrivilegeEscalation ResourceDeletion (+2 more) |
ClusterRole openebs | */nodes/proxy | * | Critical | ClusterAdminAccess ClusterWideAccess CodeExecution DataExposure LateralMovement (+3 more) |
ClusterRole openebs | */persistentvolumes | * | Critical | ClusterWideAccess DataExposure DataLoss DenialOfService StorageManipulation (+2 more) |
ClusterRole openebs | */pods | * | Critical | ClusterWideAccess LateralMovement Persistence PotentialPrivilegeEscalation PrivilegeEscalation (+3 more) |
ClusterRole openebs | */pods/exec | * | Critical | ClusterWideAccess ClusterWidePodExec CodeExecution ElevationOfPrivilege LateralMovement (+3 more) |
ClusterRole openebs | */secrets | * | Critical | ClusterWideAccess ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure (+6 more) |
ClusterRole openebs | */services | * | Critical | ClusterWideAccess DenialOfService NetworkManipulation ServiceExposure Tampering (+1 more) |
ClusterRole openebs | */statefulsets | * | Critical | ClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more) |
ClusterRole openebs | admissionregistration.k8s.io/validatingwebhookconfigurations | create · delete · get · list · patch · update | Critical | DenialOfService Tampering WebhookManipulation |
ClusterRole openebs | cstor.openebs.io/* | * | High | ClusterWideAccess |
ClusterRole openebs | openebs.io/* | * | High | ClusterWideAccess |
ClusterRole openebs | */certificatesigningrequests | list · watch | High | ClusterWideAccess |
ClusterRole openebs | */deployments/finalizers | * | High | ClusterWideAccess |
ClusterRole openebs | */horizontalpodautoscalers | list · watch | High | ClusterWideAccess |
ClusterRole openebs | */ingresses | list · watch | High | ClusterWideAccess |
ClusterRole openebs | */limitranges | list · watch | High | ClusterWideAccess |
ClusterRole openebs | */namespaces | * | High | ClusterStructure ClusterWideAccess DenialOfService InformationDisclosure NamespaceLifecycle (+3 more) |
ClusterRole openebs | */persistentvolumeclaims | * | High | ClusterWideAccess |
ClusterRole openebs | */poddisruptionbudgets | list · watch | High | ClusterWideAccess |
ClusterRole openebs | */replicasets | * | High | ClusterWideAccess |
ClusterRole openebs | */replicationcontrollers | * | High | ClusterWideAccess |
ClusterRole openebs | */resourcequotas | list · watch | High | ClusterWideAccess |
ClusterRole openebs | */storageclasses | * | High | ClusterWideAccess DenialOfService StorageManipulation Tampering |
ClusterRole openebs | */verticalpodautoscalers | list · watch | High | ClusterWideAccess |
ClusterRole openebs | */events | * | Medium | ClusterWideAccess InformationDisclosure OperationalData Reconnaissance |
ClusterRole openebs | coordination.k8s.io/leases | create · delete · get · list · update · watch | Low | |
ClusterRole openebs | volumesnapshot.external-storage.k8s.io/volumesnapshotdatas | create · delete · get · list · patch · update · watch | Low | |
ClusterRole openebs | volumesnapshot.external-storage.k8s.io/volumesnapshots | create · delete · get · list · patch · update · watch | Low |
⚠️ Potential Abuse (41)
The following security risks were found based on the above permissions:
- Cluster-wide pod exec
- Namespaced pod exec
- Create pods cluster-wide
- Create pods in a namespace
- Update/Patch pods cluster-wide
- Update/Patch pods in a namespace
- Read secrets cluster-wide
- Read secrets in a namespace
- Modify secrets cluster-wide
- Modify secrets in a namespace
- Node proxy access (Kubelet API)
- Modify node configuration (labels, taints)
- Delete nodes
- Manage PersistentVolumes (cluster-wide storage manipulation)
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Delete namespaces
- Manage Deployments cluster-wide (potential for privileged pod execution)
- Manage Deployments in a namespace (potential for privileged pod execution)
- Manage DaemonSets cluster-wide (runs on all nodes, high impact)
- Manage DaemonSets in a namespace (runs on nodes, high impact)
- Manage StatefulSets cluster-wide
- Manage StatefulSets in a namespace
- Manage CronJobs cluster-wide (scheduled privileged execution, persistence)
- Manage CronJobs in a namespace (scheduled privileged execution, persistence)
- Manage Jobs cluster-wide (one-off privileged execution)
- Manage Jobs in a namespace (one-off privileged execution)
- Manage MutatingWebhookConfigurations
- Manage ValidatingWebhookConfigurations
- Manage CustomResourceDefinitions
- Manage StorageClasses
- Read events cluster-wide
- Manage Endpoints or EndpointSlices cluster-wide
- Manage Endpoints or EndpointSlices in a namespace
- Manage Services cluster-wide
- Manage Services in a namespace
- List Namespaces (Cluster Reconnaissance)
📦 Workloads (3)
Kind | Name | Container | Image |
---|---|---|---|
DaemonSet | openebs-ndm | openebs-ndm | openebs/node-disk-manager:2.1.0 |
Deployment | openebs-localpv-provisioner | openebs-localpv-provisioner | openebs/provisioner-localpv:3.5.0 |
Deployment | openebs-ndm-operator | openebs-ndm-operator | openebs/node-disk-operator:2.1.0 |
🤖 openebs-cstor-csi-controller-sa
Namespace: default
| Automount: ❌
🔑 Permissions (36)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole openebs-cstor-csi-provisioner-role | coordination.k8s.io/leases | * | Critical | ClusterWideAccess ControlPlaneDisruption CriticalNamespace DenialOfService LeaderElectionAbuse (+2 more) |
ClusterRole openebs-cstor-csi-provisioner-role | core/services | create · delete · get · list · patch · update · watch | Critical | DenialOfService NetworkManipulation ServiceExposure Tampering |
ClusterRole openebs-cstor-csi-provisioner-role | storage.k8s.io/volumeattachments | create · delete · get · list · patch · update · watch | Critical | DataExposure DenialOfService NodeAccess PotentialPrivilegeEscalation StorageManipulation (+1 more) |
ClusterRole openebs-cstor-csi-provisioner-role | */cstorvolumeattachments | * | High | ClusterWideAccess |
ClusterRole openebs-cstor-csi-provisioner-role | */cstorvolumeconfigs | * | High | ClusterWideAccess |
ClusterRole openebs-cstor-csi-provisioner-role | */cstorvolumes | * | High | ClusterWideAccess |
ClusterRole openebs-cstor-csi-attacher-role | storage.k8s.io/csinodes | get · list · update · watch | Medium | InformationDisclosure NodeAccess Reconnaissance StorageDetailsDisclosure |
ClusterRole openebs-cstor-csi-provisioner-role | storage.k8s.io/csinodes | get · list · watch | Medium | InformationDisclosure NodeAccess Reconnaissance StorageDetailsDisclosure |
ClusterRole openebs-cstor-csi-cluster-registrar-role | csi.storage.k8s.io/csidrivers | create · delete | Low | |
ClusterRole openebs-cstor-csi-attacher-role | csi.storage.k8s.io/csinodeinfos | get · list · watch | Low | |
ClusterRole openebs-cstor-csi-snapshotter-role | apiextensions.k8s.io/customresourcedefinitions | create · delete · get · list · update · watch | Low | |
ClusterRole openebs-cstor-csi-provisioner-role | core/events | create · list · patch · update · watch | Low | |
ClusterRole openebs-cstor-csi-snapshotter-role | core/events | create · list · patch · update · watch | Low | |
ClusterRole openebs-cstor-csi-snapshotter-role | coordination.k8s.io/leases | create · delete · get · list · update · watch | Low | |
ClusterRole openebs-cstor-csi-provisioner-role | core/namespaces | get · list | Low | |
ClusterRole openebs-cstor-csi-attacher-role | core/nodes | get · list · watch | Low | |
ClusterRole openebs-cstor-csi-provisioner-role | core/persistentvolumeclaims | get · list · update · watch | Low | |
ClusterRole openebs-cstor-csi-snapshotter-role | core/persistentvolumeclaims | get · list · watch | Low | |
ClusterRole openebs-cstor-csi-provisioner-role | core/persistentvolumeclaims/status | patch · update | Low | |
ClusterRole openebs-cstor-csi-attacher-role | core/persistentvolumes | get · list · update · watch | Low | |
ClusterRole openebs-cstor-csi-provisioner-role | core/persistentvolumes | create · delete · get · list · patch · update · watch | Low | |
ClusterRole openebs-cstor-csi-snapshotter-role | core/persistentvolumes | get · list · watch | Low | |
ClusterRole openebs-cstor-csi-provisioner-role | core/pods | get · list · watch | Low | |
ClusterRole openebs-cstor-csi-provisioner-role | core/secrets | get · list | Low | |
ClusterRole openebs-cstor-csi-snapshotter-role | core/secrets | get · list | Low | |
ClusterRole openebs-cstor-csi-provisioner-role | storage.k8s.io/storageclasses | get · list · watch | Low | |
ClusterRole openebs-cstor-csi-snapshotter-role | storage.k8s.io/storageclasses | get · list · watch | Low | |
ClusterRole openebs-cstor-csi-attacher-role | storage.k8s.io/volumeattachments | get · list · update · watch | Low | |
ClusterRole openebs-cstor-csi-attacher-role | storage.k8s.io/volumeattachments/status | patch | Low | |
ClusterRole openebs-cstor-csi-snapshotter-role | snapshot.storage.k8s.io/volumesnapshotclasses | get · list · watch | Low | |
ClusterRole openebs-cstor-csi-provisioner-role | snapshot.storage.k8s.io/volumesnapshotcontents | get · list | Low | |
ClusterRole openebs-cstor-csi-snapshotter-role | snapshot.storage.k8s.io/volumesnapshotcontents | create · delete · get · list · patch · update · watch | Low | |
ClusterRole openebs-cstor-csi-snapshotter-role | snapshot.storage.k8s.io/volumesnapshotcontents/status | update | Low | |
ClusterRole openebs-cstor-csi-provisioner-role | snapshot.storage.k8s.io/volumesnapshots | get · list | Low | |
ClusterRole openebs-cstor-csi-snapshotter-role | snapshot.storage.k8s.io/volumesnapshots | get · list · patch · update · watch | Low | |
ClusterRole openebs-cstor-csi-snapshotter-role | snapshot.storage.k8s.io/volumesnapshots/status | update | Low |
⚠️ Potential Abuse (8)
The following security risks were found based on the above permissions:
- Manage Services cluster-wide
- Manage Services in a namespace
- Manage Leases cluster-wide
- Manage Leases in kube-system or kube-node-lease namespace
- Read CSINode Objects (Node & Storage Reconnaissance)
- Manage VolumeAttachments (Cluster-wide Storage/Node Manipulation)
📦 Workloads (6)
Kind | Name | Container | Image |
---|---|---|---|
StatefulSet | openebs-cstor-csi-controller | csi-attacher | registry.k8s.io/sig-storage/csi-attacher:v4.3.0 |
StatefulSet | openebs-cstor-csi-controller | csi-provisioner | registry.k8s.io/sig-storage/csi-provisioner:v3.5.0 |
StatefulSet | openebs-cstor-csi-controller | csi-resizer | registry.k8s.io/sig-storage/csi-resizer:v1.8.0 |
StatefulSet | openebs-cstor-csi-controller | csi-snapshotter | registry.k8s.io/sig-storage/csi-snapshotter:v6.2.2 |
StatefulSet | openebs-cstor-csi-controller | cstor-csi-plugin | openebs/cstor-csi-driver:3.6.0 |
StatefulSet | openebs-cstor-csi-controller | snapshot-controller | registry.k8s.io/sig-storage/snapshot-controller:v6.2.2 |
🤖 openebs-jiva-csi-controller-sa
Namespace: default
| Automount: ❌
🔑 Permissions (36)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole openebs-jiva-csi-provisioner-role | coordination.k8s.io/leases | * | Critical | ClusterWideAccess ControlPlaneDisruption CriticalNamespace DenialOfService LeaderElectionAbuse (+2 more) |
ClusterRole openebs-jiva-csi-provisioner-role | core/services | create · delete · get · list · patch · update · watch | Critical | DenialOfService NetworkManipulation ServiceExposure Tampering |
ClusterRole openebs-jiva-csi-provisioner-role | storage.k8s.io/volumeattachments | create · delete · get · list · patch · update · watch | Critical | DataExposure DenialOfService NodeAccess PotentialPrivilegeEscalation StorageManipulation (+1 more) |
ClusterRole openebs-jiva-csi-provisioner-role | */jivavolumeattachments | * | High | ClusterWideAccess |
ClusterRole openebs-jiva-csi-provisioner-role | */jivavolumeconfigs | * | High | ClusterWideAccess |
ClusterRole openebs-jiva-csi-provisioner-role | */jivavolumes | * | High | ClusterWideAccess |
ClusterRole openebs-jiva-csi-attacher-role | storage.k8s.io/csinodes | get · list · update · watch | Medium | InformationDisclosure NodeAccess Reconnaissance StorageDetailsDisclosure |
ClusterRole openebs-jiva-csi-provisioner-role | storage.k8s.io/csinodes | get · list · watch | Medium | InformationDisclosure NodeAccess Reconnaissance StorageDetailsDisclosure |
ClusterRole openebs-jiva-csi-cluster-registrar-role | csi.storage.k8s.io/csidrivers | create · delete | Low | |
ClusterRole openebs-jiva-csi-attacher-role | csi.storage.k8s.io/csinodeinfos | get · list · watch | Low | |
ClusterRole openebs-jiva-csi-snapshotter-role | apiextensions.k8s.io/customresourcedefinitions | create · delete · get · list · update · watch | Low | |
ClusterRole openebs-jiva-csi-provisioner-role | core/events | create · list · patch · update · watch | Low | |
ClusterRole openebs-jiva-csi-snapshotter-role | core/events | create · list · patch · update · watch | Low | |
ClusterRole openebs-jiva-csi-snapshotter-role | coordination.k8s.io/leases | create · delete · get · list · update · watch | Low | |
ClusterRole openebs-jiva-csi-provisioner-role | core/namespaces | get · list | Low | |
ClusterRole openebs-jiva-csi-attacher-role | core/nodes | get · list · watch | Low | |
ClusterRole openebs-jiva-csi-provisioner-role | core/persistentvolumeclaims | get · list · update · watch | Low | |
ClusterRole openebs-jiva-csi-snapshotter-role | core/persistentvolumeclaims | get · list · watch | Low | |
ClusterRole openebs-jiva-csi-provisioner-role | core/persistentvolumeclaims/status | patch · update | Low | |
ClusterRole openebs-jiva-csi-attacher-role | core/persistentvolumes | get · list · update · watch | Low | |
ClusterRole openebs-jiva-csi-provisioner-role | core/persistentvolumes | create · delete · get · list · patch · update · watch | Low | |
ClusterRole openebs-jiva-csi-snapshotter-role | core/persistentvolumes | get · list · watch | Low | |
ClusterRole openebs-jiva-csi-provisioner-role | core/pods | get · list · watch | Low | |
ClusterRole openebs-jiva-csi-provisioner-role | core/secrets | get · list | Low | |
ClusterRole openebs-jiva-csi-snapshotter-role | core/secrets | get · list | Low | |
ClusterRole openebs-jiva-csi-provisioner-role | storage.k8s.io/storageclasses | get · list · watch | Low | |
ClusterRole openebs-jiva-csi-snapshotter-role | storage.k8s.io/storageclasses | get · list · watch | Low | |
ClusterRole openebs-jiva-csi-attacher-role | storage.k8s.io/volumeattachments | get · list · update · watch | Low | |
ClusterRole openebs-jiva-csi-attacher-role | storage.k8s.io/volumeattachments/status | patch | Low | |
ClusterRole openebs-jiva-csi-snapshotter-role | snapshot.storage.k8s.io/volumesnapshotclasses | get · list · watch | Low | |
ClusterRole openebs-jiva-csi-provisioner-role | snapshot.storage.k8s.io/volumesnapshotcontents | get · list | Low | |
ClusterRole openebs-jiva-csi-snapshotter-role | snapshot.storage.k8s.io/volumesnapshotcontents | create · delete · get · list · update · watch | Low | |
ClusterRole openebs-jiva-csi-snapshotter-role | snapshot.storage.k8s.io/volumesnapshotcontents/status | update | Low | |
ClusterRole openebs-jiva-csi-provisioner-role | snapshot.storage.k8s.io/volumesnapshots | get · list | Low | |
ClusterRole openebs-jiva-csi-snapshotter-role | snapshot.storage.k8s.io/volumesnapshots | get · list · update · watch | Low | |
ClusterRole openebs-jiva-csi-snapshotter-role | snapshot.storage.k8s.io/volumesnapshots/status | update | Low |
⚠️ Potential Abuse (8)
The following security risks were found based on the above permissions:
- Manage Services cluster-wide
- Manage Services in a namespace
- Manage Leases cluster-wide
- Manage Leases in kube-system or kube-node-lease namespace
- Read CSINode Objects (Node & Storage Reconnaissance)
- Manage VolumeAttachments (Cluster-wide Storage/Node Manipulation)
📦 Workloads (5)
Kind | Name | Container | Image |
---|---|---|---|
StatefulSet | openebs-jiva-csi-controller | csi-attacher | registry.k8s.io/sig-storage/csi-attacher:v4.3.0 |
StatefulSet | openebs-jiva-csi-controller | csi-provisioner | registry.k8s.io/sig-storage/csi-provisioner:v3.5.0 |
StatefulSet | openebs-jiva-csi-controller | csi-resizer | registry.k8s.io/sig-storage/csi-resizer:v1.8.0 |
StatefulSet | openebs-jiva-csi-controller | jiva-csi-plugin | openebs/jiva-csi:3.6.0 |
StatefulSet | openebs-jiva-csi-controller | liveness-probe | registry.k8s.io/sig-storage/livenessprobe:v2.10.0 |
🤖 openebs-cstor-operator
Namespace: default
| Automount: ❌
🔑 Permissions (35)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole openebs-cstor-operator | */configmaps | * | Critical | ClusterWideAccess ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation (+2 more) |
ClusterRole openebs-cstor-operator | */cronjobs | * | Critical | ClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more) |
ClusterRole openebs-cstor-operator | apiextensions.k8s.io/customresourcedefinitions | create · delete · get · list · patch · update | Critical | CRDManipulation PotentialPrivilegeEscalation Tampering |
ClusterRole openebs-cstor-operator | */daemonsets | * | Critical | ClusterWideAccess NodeAccess Persistence PrivilegeEscalation Tampering (+2 more) |
ClusterRole openebs-cstor-operator | */deployments | * | Critical | ClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more) |
ClusterRole openebs-cstor-operator | */endpoints | * | Critical | ClusterWideAccess DenialOfService ManInTheMiddle NetworkManipulation Tampering (+2 more) |
ClusterRole openebs-cstor-operator | */jobs | * | Critical | ClusterWideAccess PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+1 more) |
ClusterRole openebs-cstor-operator | admissionregistration.k8s.io/mutatingwebhookconfigurations | create · delete · get · list · patch · update | Critical | DenialOfService PrivilegeEscalation Tampering WebhookManipulation |
ClusterRole openebs-cstor-operator | */nodes | * | Critical | ClusterWideAccess DenialOfService NodeAccess PotentialPrivilegeEscalation ResourceDeletion (+2 more) |
ClusterRole openebs-cstor-operator | */nodes/proxy | * | Critical | ClusterAdminAccess ClusterWideAccess CodeExecution DataExposure LateralMovement (+3 more) |
ClusterRole openebs-cstor-operator | */persistentvolumes | * | Critical | ClusterWideAccess DataExposure DataLoss DenialOfService StorageManipulation (+2 more) |
ClusterRole openebs-cstor-operator | */pods | * | Critical | ClusterWideAccess LateralMovement Persistence PotentialPrivilegeEscalation PrivilegeEscalation (+3 more) |
ClusterRole openebs-cstor-operator | */secrets | * | Critical | ClusterWideAccess ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure (+6 more) |
ClusterRole openebs-cstor-operator | */services | * | Critical | ClusterWideAccess DenialOfService NetworkManipulation ServiceExposure Tampering (+1 more) |
ClusterRole openebs-cstor-operator | */statefulsets | * | Critical | ClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more) |
ClusterRole openebs-cstor-operator | admissionregistration.k8s.io/validatingwebhookconfigurations | create · delete · get · list · patch · update | Critical | DenialOfService Tampering WebhookManipulation |
ClusterRole openebs-cstor-operator | cstor.openebs.io/* | * | High | ClusterWideAccess |
ClusterRole openebs-cstor-operator | openebs.io/* | * | High | ClusterWideAccess |
ClusterRole openebs-cstor-operator | */certificatesigningrequests | list · watch | High | ClusterWideAccess |
ClusterRole openebs-cstor-operator | */deployments/finalizers | * | High | ClusterWideAccess |
ClusterRole openebs-cstor-operator | */limitranges | list · watch | High | ClusterWideAccess |
ClusterRole openebs-cstor-operator | */migrationtasks | * | High | ClusterWideAccess |
ClusterRole openebs-cstor-operator | */namespaces | * | High | ClusterStructure ClusterWideAccess DenialOfService InformationDisclosure NamespaceLifecycle (+3 more) |
ClusterRole openebs-cstor-operator | */persistentvolumeclaims | * | High | ClusterWideAccess |
ClusterRole openebs-cstor-operator | */poddisruptionbudgets | create · delete · get · list · watch | High | ClusterWideAccess |
ClusterRole openebs-cstor-operator | */replicasets | * | High | ClusterWideAccess |
ClusterRole openebs-cstor-operator | */replicationcontrollers | * | High | ClusterWideAccess |
ClusterRole openebs-cstor-operator | */resourcequotas | list · watch | High | ClusterWideAccess |
ClusterRole openebs-cstor-operator | */storageclasses | * | High | ClusterWideAccess DenialOfService StorageManipulation Tampering |
ClusterRole openebs-cstor-operator | */upgradetasks | * | High | ClusterWideAccess |
ClusterRole openebs-cstor-operator | */events | * | Medium | ClusterWideAccess InformationDisclosure OperationalData Reconnaissance |
ClusterRole openebs-cstor-operator | coordination.k8s.io/leases | create · delete · get · list · update · watch | Low | |
ClusterRole openebs-cstor-migration | snapshot.storage.k8s.io/volumesnapshotclasses | get · list | Low | |
ClusterRole openebs-cstor-migration | snapshot.storage.k8s.io/volumesnapshotcontents | create · get · list | Low | |
ClusterRole openebs-cstor-migration | snapshot.storage.k8s.io/volumesnapshots | create · get · list | Low |
⚠️ Potential Abuse (39)
The following security risks were found based on the above permissions:
- Create pods cluster-wide
- Create pods in a namespace
- Update/Patch pods cluster-wide
- Update/Patch pods in a namespace
- Read secrets cluster-wide
- Read secrets in a namespace
- Modify secrets cluster-wide
- Modify secrets in a namespace
- Node proxy access (Kubelet API)
- Modify node configuration (labels, taints)
- Delete nodes
- Manage PersistentVolumes (cluster-wide storage manipulation)
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Delete namespaces
- Manage Deployments cluster-wide (potential for privileged pod execution)
- Manage Deployments in a namespace (potential for privileged pod execution)
- Manage DaemonSets cluster-wide (runs on all nodes, high impact)
- Manage DaemonSets in a namespace (runs on nodes, high impact)
- Manage StatefulSets cluster-wide
- Manage StatefulSets in a namespace
- Manage CronJobs cluster-wide (scheduled privileged execution, persistence)
- Manage CronJobs in a namespace (scheduled privileged execution, persistence)
- Manage Jobs cluster-wide (one-off privileged execution)
- Manage Jobs in a namespace (one-off privileged execution)
- Manage MutatingWebhookConfigurations
- Manage ValidatingWebhookConfigurations
- Manage CustomResourceDefinitions
- Manage StorageClasses
- Read events cluster-wide
- Manage Endpoints or EndpointSlices cluster-wide
- Manage Endpoints or EndpointSlices in a namespace
- Manage Services cluster-wide
- Manage Services in a namespace
- List Namespaces (Cluster Reconnaissance)
📦 Workloads (4)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | openebs-cstor-admission-server | openebs-cstor-admission-webhook | openebs/cstor-webhook:3.6.0 |
Deployment | openebs-cstor-cspc-operator | openebs-cstor-cspc-operator | openebs/cspc-operator:3.6.0 |
Deployment | openebs-cstor-cvc-operator | openebs-cstor-cvc-operator | openebs/cvc-operator:3.6.0 |
Job | openebs-cstor-webhook-cleanup | kubectl | bitnami/kubectl:1.20 |
🤖 openebs-nfs-provisioner
Namespace: default
| Automount: ❌
🔑 Permissions (30)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole openebs-nfs-provisioner | */configmaps | * | Critical | ClusterWideAccess ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation (+2 more) |
ClusterRole openebs-nfs-provisioner | */cronjobs | * | Critical | ClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more) |
ClusterRole openebs-nfs-provisioner | apiextensions.k8s.io/customresourcedefinitions | create · delete · get · list · patch · update | Critical | CRDManipulation PotentialPrivilegeEscalation Tampering |
ClusterRole openebs-nfs-provisioner | */daemonsets | * | Critical | ClusterWideAccess NodeAccess Persistence PrivilegeEscalation Tampering (+2 more) |
ClusterRole openebs-nfs-provisioner | */deployments | * | Critical | ClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more) |
ClusterRole openebs-nfs-provisioner | */endpoints | * | Critical | ClusterWideAccess DenialOfService ManInTheMiddle NetworkManipulation Tampering (+2 more) |
ClusterRole openebs-nfs-provisioner | */jobs | * | Critical | ClusterWideAccess PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+1 more) |
ClusterRole openebs-nfs-provisioner | */nodes | * | Critical | ClusterWideAccess DenialOfService NodeAccess PotentialPrivilegeEscalation ResourceDeletion (+2 more) |
ClusterRole openebs-nfs-provisioner | */nodes/proxy | * | Critical | ClusterAdminAccess ClusterWideAccess CodeExecution DataExposure LateralMovement (+3 more) |
ClusterRole openebs-nfs-provisioner | */persistentvolumes | * | Critical | ClusterWideAccess DataExposure DataLoss DenialOfService StorageManipulation (+2 more) |
ClusterRole openebs-nfs-provisioner | */pods | * | Critical | ClusterWideAccess LateralMovement Persistence PotentialPrivilegeEscalation PrivilegeEscalation (+3 more) |
ClusterRole openebs-nfs-provisioner | */pods/exec | * | Critical | ClusterWideAccess ClusterWidePodExec CodeExecution ElevationOfPrivilege LateralMovement (+3 more) |
ClusterRole openebs-nfs-provisioner | */secrets | * | Critical | ClusterWideAccess ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure (+6 more) |
ClusterRole openebs-nfs-provisioner | */services | * | Critical | ClusterWideAccess DenialOfService NetworkManipulation ServiceExposure Tampering (+1 more) |
ClusterRole openebs-nfs-provisioner | */statefulsets | * | Critical | ClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more) |
ClusterRole openebs-nfs-provisioner | openebs.io/* | * | High | ClusterWideAccess |
ClusterRole openebs-nfs-provisioner | */certificatesigningrequests | list · watch | High | ClusterWideAccess |
ClusterRole openebs-nfs-provisioner | */deployments/finalizers | * | High | ClusterWideAccess |
ClusterRole openebs-nfs-provisioner | */horizontalpodautoscalers | list · watch | High | ClusterWideAccess |
ClusterRole openebs-nfs-provisioner | */ingresses | list · watch | High | ClusterWideAccess |
ClusterRole openebs-nfs-provisioner | */limitranges | list · watch | High | ClusterWideAccess |
ClusterRole openebs-nfs-provisioner | */namespaces | * | High | ClusterStructure ClusterWideAccess DenialOfService InformationDisclosure NamespaceLifecycle (+3 more) |
ClusterRole openebs-nfs-provisioner | */persistentvolumeclaims | * | High | ClusterWideAccess |
ClusterRole openebs-nfs-provisioner | */poddisruptionbudgets | list · watch | High | ClusterWideAccess |
ClusterRole openebs-nfs-provisioner | */replicasets | * | High | ClusterWideAccess |
ClusterRole openebs-nfs-provisioner | */replicationcontrollers | * | High | ClusterWideAccess |
ClusterRole openebs-nfs-provisioner | */resourcequotas | list · watch | High | ClusterWideAccess |
ClusterRole openebs-nfs-provisioner | */storageclasses | * | High | ClusterWideAccess DenialOfService StorageManipulation Tampering |
ClusterRole openebs-nfs-provisioner | */verticalpodautoscalers | list · watch | High | ClusterWideAccess |
ClusterRole openebs-nfs-provisioner | */events | * | Medium | ClusterWideAccess InformationDisclosure OperationalData Reconnaissance |
⚠️ Potential Abuse (39)
The following security risks were found based on the above permissions:
- Cluster-wide pod exec
- Namespaced pod exec
- Create pods cluster-wide
- Create pods in a namespace
- Update/Patch pods cluster-wide
- Update/Patch pods in a namespace
- Read secrets cluster-wide
- Read secrets in a namespace
- Modify secrets cluster-wide
- Modify secrets in a namespace
- Node proxy access (Kubelet API)
- Modify node configuration (labels, taints)
- Delete nodes
- Manage PersistentVolumes (cluster-wide storage manipulation)
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Delete namespaces
- Manage Deployments cluster-wide (potential for privileged pod execution)
- Manage Deployments in a namespace (potential for privileged pod execution)
- Manage DaemonSets cluster-wide (runs on all nodes, high impact)
- Manage DaemonSets in a namespace (runs on nodes, high impact)
- Manage StatefulSets cluster-wide
- Manage StatefulSets in a namespace
- Manage CronJobs cluster-wide (scheduled privileged execution, persistence)
- Manage CronJobs in a namespace (scheduled privileged execution, persistence)
- Manage Jobs cluster-wide (one-off privileged execution)
- Manage Jobs in a namespace (one-off privileged execution)
- Manage CustomResourceDefinitions
- Manage StorageClasses
- Read events cluster-wide
- Manage Endpoints or EndpointSlices cluster-wide
- Manage Endpoints or EndpointSlices in a namespace
- Manage Services cluster-wide
- Manage Services in a namespace
- List Namespaces (Cluster Reconnaissance)
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | openebs-nfs-provisioner | openebs-nfs-provisioner | openebs/provisioner-nfs:0.11.0 |
🤖 openebs-jaeger-operator
Namespace: default
| Automount: ❌
🔑 Permissions (26)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole openebs-jaeger-operator | rbac.authorization.k8s.io/clusterrolebindings | create · delete · get · list · patch · update · watch | Critical | BindingToPrivilegedRole ClusterAdminAccess InformationDisclosure PrivilegeEscalation RBACManipulation (+2 more) |
ClusterRole openebs-jaeger-operator | core/configmaps | create · delete · get · list · patch · update · watch | Critical | ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering |
ClusterRole openebs-jaeger-operator | batch/cronjobs | create · delete · get · list · patch · update · watch | Critical | Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle |
ClusterRole openebs-jaeger-operator | apps/daemonsets | create · delete · get · list · patch · update · watch | Critical | NodeAccess Persistence PrivilegeEscalation Tampering WorkloadLifecycle |
ClusterRole openebs-jaeger-operator | apps/deployments | create · delete · get · list · patch · update · watch | Critical | Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle |
ClusterRole openebs-jaeger-operator | batch/jobs | create · delete · get · list · patch · update · watch | Critical | PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle |
ClusterRole openebs-jaeger-operator | core/pods | create · delete · get · list · patch · update · watch | Critical | LateralMovement Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+1 more) |
ClusterRole openebs-jaeger-operator | core/secrets | create · delete · get · list · patch · update · watch | Critical | ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure Persistence (+4 more) |
ClusterRole openebs-jaeger-operator | core/services | create · delete · get · list · patch · update · watch | Critical | DenialOfService NetworkManipulation ServiceExposure Tampering |
ClusterRole openebs-jaeger-operator | apps/statefulsets | create · delete · get · list · patch · update · watch | Critical | Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle |
ClusterRole openebs-jaeger-operator | jaegertracing.io/* | create · delete · get · list · patch · update · watch | High | ClusterWideAccess |
ClusterRole openebs-jaeger-operator | networking.k8s.io/ingresses | create · delete · get · list · patch · update · watch | High | DenialOfService NetworkManipulation ServiceExposure Tampering |
ClusterRole openebs-jaeger-operator | core/serviceaccounts | create · delete · get · list · patch · update · watch | High | IdentityManagement PotentialPrivilegeEscalation Tampering |
ClusterRole openebs-jaeger-operator | console.openshift.io/consolelinks | create · delete · get · list · patch · update · watch | Low | |
ClusterRole openebs-jaeger-operator | apps/deployments/finalizers | update | Low | |
ClusterRole openebs-jaeger-operator | logging.openshift.io/elasticsearches | create · delete · get · list · patch · update · watch | Low | |
ClusterRole openebs-jaeger-operator | autoscaling/horizontalpodautoscalers | create · delete · get · list · patch · update · watch | Low | |
ClusterRole openebs-jaeger-operator | extensions/ingresses | create · delete · get · list · patch · update · watch | Low | |
ClusterRole openebs-jaeger-operator | kafka.strimzi.io/kafkas | create · delete · get · list · patch · update · watch | Low | |
ClusterRole openebs-jaeger-operator | kafka.strimzi.io/kafkausers | create · delete · get · list · patch · update · watch | Low | |
ClusterRole openebs-jaeger-operator | core/namespaces | get · list · watch | Low | ClusterStructure InformationDisclosure Reconnaissance |
ClusterRole openebs-jaeger-operator | core/persistentvolumeclaims | create · delete · get · list · patch · update · watch | Low | |
ClusterRole openebs-jaeger-operator | apps/replicasets | create · delete · get · list · patch · update · watch | Low | |
ClusterRole openebs-jaeger-operator | route.openshift.io/routes | create · delete · get · list · patch · update · watch | Low | |
ClusterRole openebs-jaeger-operator | monitoring.coreos.com/servicemonitors | create · delete · get · list · patch · update · watch | Low | |
ClusterRole openebs-jaeger-operator | core/services/finalizers | create · delete · get · list · patch · update · watch | Low |
⚠️ Potential Abuse (32)
The following security risks were found based on the above permissions:
- Create pods cluster-wide
- Create pods in a namespace
- Update/Patch pods cluster-wide
- Update/Patch pods in a namespace
- Read secrets cluster-wide
- Read secrets in a namespace
- Modify secrets cluster-wide
- Modify secrets in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Manage ClusterRoleBindings (create, update, patch, delete)
- Manage Deployments cluster-wide (potential for privileged pod execution)
- Manage Deployments in a namespace (potential for privileged pod execution)
- Manage DaemonSets cluster-wide (runs on all nodes, high impact)
- Manage DaemonSets in a namespace (runs on nodes, high impact)
- Manage StatefulSets cluster-wide
- Manage StatefulSets in a namespace
- Manage CronJobs cluster-wide (scheduled privileged execution, persistence)
- Manage CronJobs in a namespace (scheduled privileged execution, persistence)
- Manage Jobs cluster-wide (one-off privileged execution)
- Manage Jobs in a namespace (one-off privileged execution)
- Manage ServiceAccounts cluster-wide
- Manage ServiceAccounts in a namespace
- Manage Services cluster-wide
- Manage Services in a namespace
- Read RBAC configuration cluster-wide
- List Namespaces (Cluster Reconnaissance)
- Manage Ingresses (Namespace Service Exposure/Traffic Redirection)
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | openebs-jaeger-operator | openebs-jaeger-operator | jaegertracing/jaeger-operator:1.24.0 |
🤖 openebs-lvm-controller-sa
Namespace: default
| Automount: ❌
🔑 Permissions (26)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole openebs-lvm-provisioner-role | core/pods | get · list · patch · update · watch | Critical | PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadExecution |
ClusterRole openebs-lvm-provisioner-role | core/services | create · delete · get · list · patch · update · watch | Critical | DenialOfService NetworkManipulation ServiceExposure Tampering |
ClusterRole openebs-lvm-provisioner-role | local.openebs.io/lvmnodes | * | High | ClusterWideAccess |
ClusterRole openebs-lvm-provisioner-role | local.openebs.io/lvmsnapshots | * | High | ClusterWideAccess |
ClusterRole openebs-lvm-provisioner-role | local.openebs.io/lvmvolumes | * | High | ClusterWideAccess |
ClusterRole openebs-lvm-provisioner-role | storage.k8s.io/csinodes | get · list · watch | Medium | InformationDisclosure NodeAccess Reconnaissance StorageDetailsDisclosure |
ClusterRole openebs-lvm-provisioner-role | storage.k8s.io/csistoragecapacities | * | Low | ClusterWideAccess InformationDisclosure Reconnaissance StorageDetailsDisclosure |
ClusterRole openebs-lvm-snapshotter-role | apiextensions.k8s.io/customresourcedefinitions | create · delete · list · watch | Low | |
ClusterRole openebs-lvm-provisioner-role | core/events | create · list · patch · update · watch | Low | |
ClusterRole openebs-lvm-snapshotter-role | core/events | create · list · patch · update · watch | Low | |
ClusterRole openebs-lvm-provisioner-role | coordination.k8s.io/leases | create · delete · get · list · update · watch | Low | |
ClusterRole openebs-lvm-provisioner-role | core/namespaces | get · list · watch | Low | ClusterStructure InformationDisclosure Reconnaissance |
ClusterRole openebs-lvm-provisioner-role | core/nodes | get · list · watch | Low | |
ClusterRole openebs-lvm-provisioner-role | core/persistentvolumeclaims | get · list · update · watch | Low | |
ClusterRole openebs-lvm-snapshotter-role | core/persistentvolumeclaims | get · list · watch | Low | |
ClusterRole openebs-lvm-provisioner-role | core/persistentvolumeclaims/status | patch · update | Low | |
ClusterRole openebs-lvm-provisioner-role | core/persistentvolumes | create · delete · get · list · patch · update · watch | Low | |
ClusterRole openebs-lvm-snapshotter-role | core/persistentvolumes | get · list · watch | Low | |
ClusterRole openebs-lvm-snapshotter-role | core/secrets | get · list | Low | |
ClusterRole openebs-lvm-provisioner-role | storage.k8s.io/storageclasses | get · list · watch | Low | |
ClusterRole openebs-lvm-snapshotter-role | storage.k8s.io/storageclasses | get · list · watch | Low | |
ClusterRole openebs-lvm-snapshotter-role | snapshot.storage.k8s.io/volumesnapshotclasses | get · list · watch | Low | |
ClusterRole openebs-lvm-snapshotter-role | snapshot.storage.k8s.io/volumesnapshotcontents | create · delete · get · list · patch · update · watch | Low | |
ClusterRole openebs-lvm-snapshotter-role | snapshot.storage.k8s.io/volumesnapshotcontents/status | update | Low | |
ClusterRole openebs-lvm-snapshotter-role | snapshot.storage.k8s.io/volumesnapshots | get · list · patch · update · watch | Low | |
ClusterRole openebs-lvm-snapshotter-role | snapshot.storage.k8s.io/volumesnapshots/status | update | Low |
⚠️ Potential Abuse (9)
The following security risks were found based on the above permissions:
- Update/Patch pods cluster-wide
- Update/Patch pods in a namespace
- Manage Services cluster-wide
- Manage Services in a namespace
- List Namespaces (Cluster Reconnaissance)
- Read CSINode Objects (Node & Storage Reconnaissance)
- Read CSIStorageCapacities (Namespace Storage Reconnaissance)
📦 Workloads (5)
Kind | Name | Container | Image |
---|---|---|---|
StatefulSet | openebs-lvm-localpv-controller | csi-provisioner | registry.k8s.io/sig-storage/csi-provisioner:v3.5.0 |
StatefulSet | openebs-lvm-localpv-controller | csi-resizer | registry.k8s.io/sig-storage/csi-resizer:v1.8.0 |
StatefulSet | openebs-lvm-localpv-controller | csi-snapshotter | registry.k8s.io/sig-storage/csi-snapshotter:v6.2.2 |
StatefulSet | openebs-lvm-localpv-controller | openebs-lvm-plugin | openebs/lvm-driver:1.4.0 |
StatefulSet | openebs-lvm-localpv-controller | snapshot-controller | registry.k8s.io/sig-storage/snapshot-controller:v6.2.2 |
🤖 openebs-jiva-operator
Namespace: default
| Automount: ❌
🔑 Permissions (18)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole jiva-operator | core/configmaps | * | Critical | ClusterWideAccess ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation (+2 more) |
ClusterRole jiva-operator | apps/daemonsets | * | Critical | ClusterWideAccess NodeAccess Persistence PrivilegeEscalation Tampering (+2 more) |
ClusterRole jiva-operator | apps/deployments | * | Critical | ClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more) |
ClusterRole jiva-operator | core/endpoints | * | Critical | ClusterWideAccess DenialOfService ManInTheMiddle NetworkManipulation Tampering (+2 more) |
ClusterRole jiva-operator | core/persistentvolumes | * | Critical | ClusterWideAccess DataExposure DataLoss DenialOfService StorageManipulation (+2 more) |
ClusterRole jiva-operator | core/pods | * | Critical | ClusterWideAccess LateralMovement Persistence PotentialPrivilegeEscalation PrivilegeEscalation (+3 more) |
ClusterRole jiva-operator | core/secrets | * | Critical | ClusterWideAccess ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure (+6 more) |
ClusterRole jiva-operator | core/services | * | Critical | ClusterWideAccess DenialOfService NetworkManipulation ServiceExposure Tampering (+1 more) |
ClusterRole jiva-operator | apps/statefulsets | * | Critical | ClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more) |
ClusterRole jiva-operator | openebs.io/* | * | High | ClusterWideAccess |
ClusterRole jiva-operator | core/persistentvolumeclaims | * | High | ClusterWideAccess |
ClusterRole jiva-operator | apps/replicasets | * · get | High | ClusterWideAccess |
ClusterRole jiva-operator | core/services/finalizers | * | High | ClusterWideAccess |
ClusterRole jiva-operator | core/events | * | Medium | ClusterWideAccess InformationDisclosure OperationalData Reconnaissance |
ClusterRole jiva-operator | policy/poddisruptionbudgets | * | Medium | AvailabilityImpact ClusterWideAccess DenialOfService Tampering |
ClusterRole jiva-operator | apps/deployments/finalizers | update | Low | |
ClusterRole jiva-operator | core/nodes | get · list · watch | Low | |
ClusterRole jiva-operator | monitoring.coreos.com/servicemonitors | create · get | Low |
⚠️ Potential Abuse (27)
The following security risks were found based on the above permissions:
- Create pods cluster-wide
- Create pods in a namespace
- Update/Patch pods cluster-wide
- Update/Patch pods in a namespace
- Read secrets cluster-wide
- Read secrets in a namespace
- Modify secrets cluster-wide
- Modify secrets in a namespace
- Manage PersistentVolumes (cluster-wide storage manipulation)
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Manage Deployments cluster-wide (potential for privileged pod execution)
- Manage Deployments in a namespace (potential for privileged pod execution)
- Manage DaemonSets cluster-wide (runs on all nodes, high impact)
- Manage DaemonSets in a namespace (runs on nodes, high impact)
- Manage StatefulSets cluster-wide
- Manage StatefulSets in a namespace
- Read events cluster-wide
- Manage Endpoints or EndpointSlices cluster-wide
- Manage Endpoints or EndpointSlices in a namespace
- Manage Services cluster-wide
- Manage Services in a namespace
- Manage PodDisruptionBudgets cluster-wide
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | openebs-jiva-operator | openebs-jiva-operator | openebs/jiva-operator:3.6.0 |
🤖 openebs-zfs-controller-sa
Namespace: default
| Automount: ❌
🔑 Permissions (18)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole openebs-zfs-provisioner-role | core/pods | get · list · patch · update · watch | Critical | PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadExecution |
ClusterRole openebs-zfs-provisioner-role | core/services | create · delete · get · list · patch · update · watch | Critical | DenialOfService NetworkManipulation ServiceExposure Tampering |
ClusterRole openebs-zfs-provisioner-role | core/namespaces | * | High | ClusterStructure ClusterWideAccess DenialOfService InformationDisclosure NamespaceLifecycle (+3 more) |
ClusterRole openebs-zfs-provisioner-role | */zfsbackups | * | High | ClusterWideAccess |
ClusterRole openebs-zfs-provisioner-role | */zfsnodes | * | High | ClusterWideAccess |
ClusterRole openebs-zfs-provisioner-role | */zfsrestores | * | High | ClusterWideAccess |
ClusterRole openebs-zfs-provisioner-role | */zfssnapshots | * | High | ClusterWideAccess |
ClusterRole openebs-zfs-provisioner-role | */zfsvolumes | * | High | ClusterWideAccess |
ClusterRole openebs-zfs-provisioner-role | storage.k8s.io/csinodes | get · list · watch | Medium | InformationDisclosure NodeAccess Reconnaissance StorageDetailsDisclosure |
ClusterRole openebs-zfs-provisioner-role | storage.k8s.io/csistoragecapacities | * | Low | ClusterWideAccess InformationDisclosure Reconnaissance StorageDetailsDisclosure |
ClusterRole openebs-zfs-provisioner-role | core/events | create · list · patch · update · watch | Low | |
ClusterRole openebs-zfs-provisioner-role | coordination.k8s.io/leases | create · delete · get · list · update · watch | Low | |
ClusterRole openebs-zfs-provisioner-role | core/nodes | get · list · watch | Low | |
ClusterRole openebs-zfs-provisioner-role | core/persistentvolumeclaims | get · list · update · watch | Low | |
ClusterRole openebs-zfs-provisioner-role | core/persistentvolumeclaims/status | patch · update | Low | |
ClusterRole openebs-zfs-provisioner-role | core/persistentvolumes | create · delete · get · list · patch · update · watch | Low | |
ClusterRole openebs-zfs-provisioner-role | core/secrets | get · list | Low | |
ClusterRole openebs-zfs-provisioner-role | storage.k8s.io/storageclasses | get · list · watch | Low |
⚠️ Potential Abuse (10)
The following security risks were found based on the above permissions:
- Update/Patch pods cluster-wide
- Update/Patch pods in a namespace
- Delete namespaces
- Manage Services cluster-wide
- Manage Services in a namespace
- List Namespaces (Cluster Reconnaissance)
- Read CSINode Objects (Node & Storage Reconnaissance)
- Read CSIStorageCapacities (Namespace Storage Reconnaissance)
📦 Workloads (5)
Kind | Name | Container | Image |
---|---|---|---|
StatefulSet | openebs-zfs-localpv-controller | csi-provisioner | registry.k8s.io/sig-storage/csi-provisioner:v3.5.0 |
StatefulSet | openebs-zfs-localpv-controller | csi-resizer | registry.k8s.io/sig-storage/csi-resizer:v1.8.0 |
StatefulSet | openebs-zfs-localpv-controller | csi-snapshotter | registry.k8s.io/sig-storage/csi-snapshotter:v6.2.2 |
StatefulSet | openebs-zfs-localpv-controller | openebs-zfs-plugin | openebs/zfs-driver:2.4.0 |
StatefulSet | openebs-zfs-localpv-controller | snapshot-controller | registry.k8s.io/sig-storage/snapshot-controller:v6.2.2 |
🤖 openebs-localpv-provisioner
Namespace: default
| Automount: ❌
🔑 Permissions (13)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole openebs-localpv-provisioner | apiextensions.k8s.io/customresourcedefinitions | create · delete · get · list · patch · update | Critical | CRDManipulation PotentialPrivilegeEscalation Tampering |
ClusterRole openebs-localpv-provisioner | */endpoints | * | Critical | ClusterWideAccess DenialOfService ManInTheMiddle NetworkManipulation Tampering (+2 more) |
ClusterRole openebs-localpv-provisioner | */persistentvolumes | * | Critical | ClusterWideAccess DataExposure DataLoss DenialOfService StorageManipulation (+2 more) |
ClusterRole openebs-localpv-provisioner | */pods | * | Critical | ClusterWideAccess LateralMovement Persistence PotentialPrivilegeEscalation PrivilegeEscalation (+3 more) |
ClusterRole openebs-localpv-provisioner | openebs.io/* | * | High | ClusterWideAccess |
ClusterRole openebs-localpv-provisioner | */limitranges | list · watch | High | ClusterWideAccess |
ClusterRole openebs-localpv-provisioner | */namespaces | * | High | ClusterStructure ClusterWideAccess DenialOfService InformationDisclosure NamespaceLifecycle (+3 more) |
ClusterRole openebs-localpv-provisioner | */nodes | get · list · watch | High | ClusterWideAccess |
ClusterRole openebs-localpv-provisioner | */persistentvolumeclaims | * | High | ClusterWideAccess |
ClusterRole openebs-localpv-provisioner | */resourcequotas | list · watch | High | ClusterWideAccess |
ClusterRole openebs-localpv-provisioner | */storageclasses | * | High | ClusterWideAccess DenialOfService StorageManipulation Tampering |
ClusterRole openebs-localpv-provisioner | */events | * | Medium | ClusterWideAccess InformationDisclosure OperationalData Reconnaissance |
ClusterRole openebs-localpv-provisioner | coordination.k8s.io/leases | create · get · update | Low |
⚠️ Potential Abuse (14)
The following security risks were found based on the above permissions:
- Create pods cluster-wide
- Create pods in a namespace
- Update/Patch pods cluster-wide
- Update/Patch pods in a namespace
- Manage PersistentVolumes (cluster-wide storage manipulation)
- Delete namespaces
- Manage CustomResourceDefinitions
- Manage StorageClasses
- Read events cluster-wide
- Manage Endpoints or EndpointSlices cluster-wide
- Manage Endpoints or EndpointSlices in a namespace
- List Namespaces (Cluster Reconnaissance)
📦 Workloads (3)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | openebs-localpv-provisioner | openebs-localpv-provisioner | openebs/provisioner-localpv:3.5.0 |
Deployment | openebs-localpv-provisioner | openebs-localpv-provisioner | openebs/provisioner-localpv:3.5.0 |
Deployment | openebs-localpv-provisioner | openebs-localpv-provisioner | openebs/provisioner-localpv:3.5.0 |
🤖 openebs-ndm
Namespace: default
| Automount: ❌
🔑 Permissions (8)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole openebs-ndm | */configmaps | * | Critical | ClusterWideAccess ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation (+2 more) |
ClusterRole openebs-ndm | apiextensions.k8s.io/customresourcedefinitions | * | Critical | CRDManipulation ClusterWideAccess PotentialPrivilegeEscalation Tampering |
ClusterRole openebs-ndm | */jobs | * | Critical | ClusterWideAccess PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+1 more) |
ClusterRole openebs-ndm | */nodes | * | Critical | ClusterWideAccess DenialOfService NodeAccess PotentialPrivilegeEscalation ResourceDeletion (+2 more) |
ClusterRole openebs-ndm | */pods | * | Critical | ClusterWideAccess LateralMovement Persistence PotentialPrivilegeEscalation PrivilegeEscalation (+3 more) |
ClusterRole openebs-ndm | openebs.io/blockdeviceclaims | * | High | ClusterWideAccess |
ClusterRole openebs-ndm | openebs.io/blockdevices | * | High | ClusterWideAccess |
ClusterRole openebs-ndm | */events | * | Medium | ClusterWideAccess InformationDisclosure OperationalData Reconnaissance |
⚠️ Potential Abuse (15)
The following security risks were found based on the above permissions:
- Create pods cluster-wide
- Create pods in a namespace
- Update/Patch pods cluster-wide
- Update/Patch pods in a namespace
- Modify node configuration (labels, taints)
- Delete nodes
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Manage Jobs cluster-wide (one-off privileged execution)
- Manage Jobs in a namespace (one-off privileged execution)
- Manage CustomResourceDefinitions
- Read events cluster-wide
📦 Workloads (10)
Kind | Name | Container | Image |
---|---|---|---|
DaemonSet | openebs-ndm | openebs-ndm | openebs/node-disk-manager:2.1.0 |
DaemonSet | openebs-ndm | openebs-ndm | openebs/node-disk-manager:2.1.0 |
DaemonSet | openebs-ndm | openebs-ndm | openebs/node-disk-manager:2.1.0 |
DaemonSet | openebs-ndm | openebs-ndm | openebs/node-disk-manager:2.1.0 |
DaemonSet | openebs-ndm | openebs-ndm | openebs/node-disk-manager:2.1.0 |
Deployment | openebs-ndm-operator | openebs-ndm-operator | openebs/node-disk-operator:2.1.0 |
Deployment | openebs-ndm-operator | openebs-ndm-operator | openebs/node-disk-operator:2.1.0 |
Deployment | openebs-ndm-operator | openebs-ndm-operator | openebs/node-disk-operator:2.1.0 |
Deployment | openebs-ndm-operator | openebs-ndm-operator | openebs/node-disk-operator:2.1.0 |
Deployment | openebs-ndm-operator | openebs-ndm-operator | openebs/node-disk-operator:2.1.0 |
🤖 openebs-grafana
Namespace: default
| Automount: ❌
🔑 Permissions (3)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole openebs-grafana-clusterrole | core/secrets | get · list · watch | Critical | ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess |
ClusterRole openebs-grafana-clusterrole | core/configmaps | get · list · watch | High | ConfigMapAccess DataExposure InformationDisclosure |
Role openebs-grafana | extensions/podsecuritypolicies | use | Low |
⚠️ Potential Abuse (5)
The following security risks were found based on the above permissions:
- Read secrets cluster-wide
- Read secrets in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
📦 Workloads (2)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | openebs-grafana | grafana | grafana/grafana:8.3.5 |
Deployment | openebs-grafana | grafana-sc-datasources | quay.io/kiwigrid/k8s-sidecar:1.15.6 |
🤖 openebs-prometheus-server
Namespace: default
| Automount: ❌
🔑 Permissions (12)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole openebs-prometheus-server | core/configmaps | get · list · watch | High | ConfigMapAccess DataExposure InformationDisclosure |
ClusterRole openebs-prometheus-server | core/endpoints | get · list · watch | Low | |
ClusterRole openebs-prometheus-server | core/ingresses | get · list · watch | Low | |
ClusterRole openebs-prometheus-server | extensions/ingresses | get · list · watch | Low | |
ClusterRole openebs-prometheus-server | networking.k8s.io/ingresses | get · list · watch | Low | |
ClusterRole openebs-prometheus-server | extensions/ingresses/status | get · list · watch | Low | |
ClusterRole openebs-prometheus-server | networking.k8s.io/ingresses/status | get · list · watch | Low | |
ClusterRole openebs-prometheus-server | core/nodes | get · list · watch | Low | |
ClusterRole openebs-prometheus-server | core/nodes/metrics | get · list · watch | Low | |
ClusterRole openebs-prometheus-server | core/nodes/proxy | get · list · watch | Low | |
ClusterRole openebs-prometheus-server | core/pods | get · list · watch | Low | |
ClusterRole openebs-prometheus-server | core/services | get · list · watch | Low |
⚠️ Potential Abuse (3)
The following security risks were found based on the above permissions:
📦 Workloads (2)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | openebs-prometheus-server | prometheus-server | quay.io/prometheus/prometheus:v2.34.0 |
Deployment | openebs-prometheus-server | prometheus-server-configmap-reload | jimmidyson/configmap-reload:v0.5.0 |
🤖 openebs-cstor-csi-node-sa
Namespace: default
| Automount: ❌
🔑 Permissions (7)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole openebs-cstor-csi-registrar-role | */cstorvolumeattachments | create · delete · get · list · patch · update · watch | High | ClusterWideAccess |
ClusterRole openebs-cstor-csi-registrar-role | */cstorvolumeconfigs | create · delete · get · list · patch · update · watch | High | ClusterWideAccess |
ClusterRole openebs-cstor-csi-registrar-role | */cstorvolumes | create · delete · get · list · patch · update · watch | High | ClusterWideAccess |
ClusterRole openebs-cstor-csi-registrar-role | core/events | create · get · list · patch · update · watch | Medium | InformationDisclosure OperationalData Reconnaissance |
ClusterRole openebs-cstor-csi-registrar-role | core/nodes | get · list · patch | Low | |
ClusterRole openebs-cstor-csi-registrar-role | core/persistentvolumes | get · list · patch | Low | |
ClusterRole openebs-cstor-csi-registrar-role | core/services | get · list · patch | Low |
⚠️ Potential Abuse (3)
The following security risks were found based on the above permissions:
📦 Workloads (2)
Kind | Name | Container | Image |
---|---|---|---|
DaemonSet | openebs-cstor-csi-node | csi-node-driver-registrar | registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.8.0 |
DaemonSet | openebs-cstor-csi-node | cstor-csi-plugin | openebs/cstor-csi-driver:3.6.0 |
🤖 openebs-jiva-csi-node-sa
Namespace: default
| Automount: ❌
🔑 Permissions (5)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole openebs-jiva-csi-registrar-role | */jivavolumes | create · delete · get · list · patch · update · watch | High | ClusterWideAccess |
ClusterRole openebs-jiva-csi-registrar-role | core/events | create · get · list · patch · update · watch | Medium | InformationDisclosure OperationalData Reconnaissance |
ClusterRole openebs-jiva-csi-registrar-role | core/nodes | get · list · patch | Low | |
ClusterRole openebs-jiva-csi-registrar-role | core/persistentvolumes | get · list · patch | Low | |
ClusterRole openebs-jiva-csi-registrar-role | core/services | get · list · patch | Low |
⚠️ Potential Abuse (3)
The following security risks were found based on the above permissions:
📦 Workloads (3)
Kind | Name | Container | Image |
---|---|---|---|
DaemonSet | openebs-jiva-csi-node | csi-node-driver-registrar | registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.8.0 |
DaemonSet | openebs-jiva-csi-node | jiva-csi-plugin | openebs/jiva-csi:3.6.0 |
DaemonSet | openebs-jiva-csi-node | liveness-probe | registry.k8s.io/sig-storage/livenessprobe:v2.10.0 |
🤖 openebs-kube-state-metrics
Namespace: default
| Automount: ❌
🔑 Permissions (31)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole openebs-kube-state-metrics | admissionregistration.k8s.io/mutatingwebhookconfigurations | list · watch | Medium | InformationDisclosure Reconnaissance WebhookReconnaissance |
ClusterRole openebs-kube-state-metrics | admissionregistration.k8s.io/validatingwebhookconfigurations | list · watch | Medium | InformationDisclosure Reconnaissance WebhookReconnaissance |
ClusterRole openebs-kube-state-metrics | certificates.k8s.io/certificatesigningrequests | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | core/configmaps | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | batch/cronjobs | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | apps/daemonsets | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | extensions/daemonsets | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | apps/deployments | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | extensions/deployments | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | core/endpoints | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | autoscaling/horizontalpodautoscalers | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | extensions/ingresses | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | networking.k8s.io/ingresses | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | batch/jobs | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | core/limitranges | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | core/namespaces | list · watch | Low | ClusterStructure InformationDisclosure Reconnaissance |
ClusterRole openebs-kube-state-metrics | networking.k8s.io/networkpolicies | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | core/nodes | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | core/persistentvolumeclaims | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | core/persistentvolumes | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | policy/poddisruptionbudgets | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | core/pods | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | apps/replicasets | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | extensions/replicasets | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | core/replicationcontrollers | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | core/resourcequotas | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | core/secrets | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | core/services | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | apps/statefulsets | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | storage.k8s.io/storageclasses | list · watch | Low | |
ClusterRole openebs-kube-state-metrics | storage.k8s.io/volumeattachments | list · watch | Low |
⚠️ Potential Abuse (4)
The following security risks were found based on the above permissions:
- List Namespaces (Cluster Reconnaissance)
- List ValidatingWebhookConfigurations (Reconnaissance)
- List MutatingWebhookConfigurations (Reconnaissance)
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | openebs-kube-state-metrics | kube-state-metrics | k8s.gcr.io/kube-state-metrics/kube-state-metrics:v2.3.0 |
🤖 openebs-service-account
Namespace: default
| Automount: ❌
🔑 Permissions (21)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole openebs-cluster-role | storage.k8s.io/csinodes | get · list · watch | Medium | InformationDisclosure NodeAccess Reconnaissance StorageDetailsDisclosure |
ClusterRole openebs-cluster-role | core/configmaps | create · get · patch · update | Low | |
ClusterRole openebs-cluster-role | apiextensions.k8s.io/customresourcedefinitions | create · get · list · patch · replace · update | Low | |
ClusterRole openebs-cluster-role | apiextensions.k8s.io/customresourcedefinitions/status | get · patch · update | Low | |
ClusterRole openebs-cluster-role | apps/deployments | get · list | Low | |
ClusterRole openebs-cluster-role | openebs.io/diskpools | create · get · list · patch · replace · update · watch | Low | |
ClusterRole openebs-cluster-role | openebs.io/diskpools/status | patch · update | Low | |
ClusterRole openebs-cluster-role | core/events | create · list · patch · update · watch | Low | |
ClusterRole openebs-cluster-role | openebs.io/mayastorpools | delete · deletecollection · get · list · patch | Low | |
ClusterRole openebs-cluster-role | core/namespaces | get | Low | |
ClusterRole openebs-cluster-role | core/nodes | get · list · patch · watch | Low | |
ClusterRole openebs-cluster-role | core/persistentvolumeclaims | get · list · update · watch | Low | |
ClusterRole openebs-cluster-role | core/persistentvolumes | create · delete · get · list · patch · update · watch | Low | |
ClusterRole openebs-cluster-role | storage.k8s.io/storageclasses | get · list · watch | Low | |
ClusterRole openebs-cluster-role | storage.k8s.io/volumeattachments | get · list · patch · update · watch | Low | |
ClusterRole openebs-cluster-role | storage.k8s.io/volumeattachments/status | patch | Low | |
ClusterRole openebs-cluster-role | snapshot.storage.k8s.io/volumesnapshotclasses | get · list · watch | Low | |
ClusterRole openebs-cluster-role | snapshot.storage.k8s.io/volumesnapshotcontents | create · delete · get · list · patch · update · watch | Low | |
ClusterRole openebs-cluster-role | snapshot.storage.k8s.io/volumesnapshotcontents/status | patch · update | Low | |
ClusterRole openebs-cluster-role | snapshot.storage.k8s.io/volumesnapshots | delete · get · list · patch · update · watch | Low | |
ClusterRole openebs-cluster-role | snapshot.storage.k8s.io/volumesnapshots/status | patch · update | Low |
⚠️ Potential Abuse (2)
The following security risks were found based on the above permissions:
📦 Workloads (2)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | openebs-obs-callhome | obs-callhome | docker.io/openebs/mayastor-obs-callhome:v2.5.0 |
Deployment | openebs-obs-callhome | obs-callhome-stats | docker.io/openebs/mayastor-obs-callhome-stats:v2.5.0 |
🤖 openebs-lvm-node-sa
Namespace: default
| Automount: ❌
🔑 Permissions (7)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole openebs-lvm-driver-registrar-role | core/events | create · get · list · patch · update · watch | Medium | InformationDisclosure OperationalData Reconnaissance |
ClusterRole openebs-lvm-driver-registrar-role | local.openebs.io/lvmnodes | create · get · list · patch · update · watch | Low | |
ClusterRole openebs-lvm-driver-registrar-role | local.openebs.io/lvmsnapshots | create · get · list · patch · update · watch | Low | |
ClusterRole openebs-lvm-driver-registrar-role | local.openebs.io/lvmvolumes | create · get · list · patch · update · watch | Low | |
ClusterRole openebs-lvm-driver-registrar-role | core/nodes | get · list | Low | |
ClusterRole openebs-lvm-driver-registrar-role | core/persistentvolumes | get · list | Low | |
ClusterRole openebs-lvm-driver-registrar-role | core/services | get · list | Low |
⚠️ Potential Abuse (2)
The following security risks were found based on the above permissions:
📦 Workloads (2)
Kind | Name | Container | Image |
---|---|---|---|
DaemonSet | openebs-lvm-localpv-node | csi-node-driver-registrar | registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.8.0 |
DaemonSet | openebs-lvm-localpv-node | openebs-lvm-plugin | openebs/lvm-driver:1.4.0 |
🤖 openebs-filebeat
Namespace: default
| Automount: ❌
🔑 Permissions (5)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
Role openebs-filebeat-role | coordination.k8s.io/leases | create · get · update | Low | |
ClusterRole openebs-filebeat-cluster-role | core/namespaces | get · list · watch | Low | ClusterStructure InformationDisclosure Reconnaissance |
ClusterRole openebs-filebeat-cluster-role | core/nodes | get · list · watch | Low | |
ClusterRole openebs-filebeat-cluster-role | core/pods | get · list · watch | Low | |
ClusterRole openebs-filebeat-cluster-role | apps/replicasets | get · list · watch | Low |
⚠️ Potential Abuse (2)
The following security risks were found based on the above permissions:
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
DaemonSet | openebs-filebeat | filebeat | docker.elastic.co/beats/filebeat:7.17.1 |
🤖 openebs-promtail
Namespace: default
| Automount: ❌
🔑 Permissions (5)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole openebs-promtail | core/endpoints | get · list · watch | Low | |
ClusterRole openebs-promtail | core/nodes | get · list · watch | Low | |
ClusterRole openebs-promtail | core/nodes/proxy | get · list · watch | Low | |
ClusterRole openebs-promtail | core/pods | get · list · watch | Low | |
ClusterRole openebs-promtail | core/services | get · list · watch | Low |
⚠️ Potential Abuse (1)
The following security risks were found based on the above permissions:
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
DaemonSet | openebs-promtail | promtail | docker.io/grafana/promtail:2.4.2 |
🤖 openebs-fluent-bit-loki
Namespace: default
| Automount: ❌
🔑 Permissions (2)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole openebs-fluent-bit-loki-clusterrole | core/namespaces | get · list · watch | Low | ClusterStructure InformationDisclosure Reconnaissance |
ClusterRole openebs-fluent-bit-loki-clusterrole | core/pods | get · list · watch | Low |
⚠️ Potential Abuse (2)
The following security risks were found based on the above permissions:
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
DaemonSet | openebs-fluent-bit-loki | fluent-bit-loki | grafana/fluent-bit-plugin-loki:2.1.0-amd64 |
🤖 openebs-grafana-test
Namespace: default
| Automount: ❌
🔑 Permissions (1)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
Role openebs-grafana-test | policy/podsecuritypolicies | use | Low |
⚠️ Potential Abuse (1)
The following security risks were found based on the above permissions:
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Pod | openebs-grafana-test | openebs-test | bats/bats:v1.4.1 |
🤖 openebs-loki
Namespace: default
| Automount: ✅
🔑 Permissions (0)
No explicit RBAC bindings.
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
StatefulSet | openebs-loki | loki | grafana/loki:2.5.0 |
🤖 openebs-nats
Namespace: default
| Automount: ❌
🔑 Permissions (0)
No explicit RBAC bindings.
📦 Workloads (3)
Kind | Name | Container | Image |
---|---|---|---|
StatefulSet | openebs-nats | metrics | natsio/prometheus-nats-exporter:0.11.0 |
StatefulSet | openebs-nats | nats | nats:2.9.17-alpine |
StatefulSet | openebs-nats | reloader | natsio/nats-server-config-reloader:0.10.1 |
🤖 openebs-prometheus-alertmanager
Namespace: default
| Automount: ❌
🔑 Permissions (0)
No explicit RBAC bindings.
📦 Workloads (2)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | openebs-prometheus-alertmanager | prometheus-alertmanager | quay.io/prometheus/alertmanager:v0.23.0 |
Deployment | openebs-prometheus-alertmanager | prometheus-alertmanager-configmap-reload | jimmidyson/configmap-reload:v0.5.0 |
🤖 openebs-prometheus-node-exporter
Namespace: default
| Automount: ❌
🔑 Permissions (0)
No explicit RBAC bindings.
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
DaemonSet | openebs-prometheus-node-exporter | prometheus-node-exporter | quay.io/prometheus/node-exporter:v1.3.0 |
🤖 openebs-prometheus-pushgateway
Namespace: default
| Automount: ❌
🔑 Permissions (0)
No explicit RBAC bindings.
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | openebs-prometheus-pushgateway | prometheus-pushgateway | prom/pushgateway:v1.4.2 |