1 Service Accounts
2 Workloads
23 Bindings
5 Critical
3 High
2 Medium
13 Low
Description
OpenTelemetry Operator Helm chart for Kubernetes
Overview
| Identity | Namespace | Automount | Secrets | Permissions | Workloads | Risk |
|---|---|---|---|---|---|---|
opentelemetry-operator | default | ❌ | — | 23 | 2 | Critical |
Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.
Identities
🤖 opentelemetry-operator
Namespace: default | Automount: ❌
🔑 Permissions (23)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
ClusterRole opentelemetry-operator-manager | core/configmaps | create · delete · get · list · patch · update · watch | Critical | ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering |
ClusterRole opentelemetry-operator-manager | apps/daemonsets | create · delete · get · list · patch · update · watch | Critical | NodeAccess Persistence PrivilegeEscalation Tampering WorkloadLifecycle |
ClusterRole opentelemetry-operator-manager | apps/deployments | create · delete · get · list · patch · update · watch | Critical | Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle |
ClusterRole opentelemetry-operator-manager | core/services | create · delete · get · list · patch · update · watch | Critical | DenialOfService NetworkManipulation ServiceExposure Tampering |
ClusterRole opentelemetry-operator-manager | apps/statefulsets | create · delete · get · list · patch · update · watch | Critical | Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle |
Role opentelemetry-operator-leader-election | core/configmaps | create · delete · get · list · patch · update · watch | High | ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering |
ClusterRole opentelemetry-operator-manager | networking.k8s.io/ingresses | create · delete · get · list · patch · update · watch | High | DenialOfService NetworkManipulation ServiceExposure Tampering |
ClusterRole opentelemetry-operator-manager | core/serviceaccounts | create · delete · get · list · patch · update · watch | High | IdentityManagement PotentialPrivilegeEscalation Tampering |
ClusterRole opentelemetry-operator-proxy | authorization.k8s.io/subjectaccessreviews | create | Medium | InformationDisclosure RBACQuery |
ClusterRole opentelemetry-operator-proxy | authentication.k8s.io/tokenreviews | create | Medium | CredentialAccess InformationDisclosure RBACQuery |
Role opentelemetry-operator-leader-election | core/configmaps/status | get · patch · update | Low | |
ClusterRole opentelemetry-operator-manager | discovery.k8s.io/endpointslices | get · list · watch | Low | |
ClusterRole opentelemetry-operator-manager | core/events | create · patch | Low | |
Role opentelemetry-operator-leader-election | core/events | create · patch | Low | |
ClusterRole opentelemetry-operator-manager | autoscaling/horizontalpodautoscalers | create · delete · get · list · patch · update · watch | Low | |
ClusterRole opentelemetry-operator-manager | opentelemetry.io/instrumentations | get · list · patch · update · watch | Low | |
ClusterRole opentelemetry-operator-manager | coordination.k8s.io/leases | create · get · list · update | Low | |
ClusterRole opentelemetry-operator-manager | core/namespaces | list · watch | Low | ClusterStructure InformationDisclosure Reconnaissance |
ClusterRole opentelemetry-operator-manager | opentelemetry.io/opentelemetrycollectors | get · list · patch · update · watch | Low | |
ClusterRole opentelemetry-operator-manager | opentelemetry.io/opentelemetrycollectors/finalizers | get · patch · update | Low | |
ClusterRole opentelemetry-operator-manager | opentelemetry.io/opentelemetrycollectors/status | get · patch · update | Low | |
ClusterRole opentelemetry-operator-manager | apps/replicasets | get · list · watch | Low | |
ClusterRole opentelemetry-operator-manager | route.openshift.io/routes | create · delete · get · list · patch · update · watch | Low |
⚠️ Potential Abuse (19)
The following security risks were found based on the above permissions:
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Manage Deployments cluster-wide (potential for privileged pod execution)
- Manage Deployments in a namespace (potential for privileged pod execution)
- Manage DaemonSets cluster-wide (runs on all nodes, high impact)
- Manage DaemonSets in a namespace (runs on nodes, high impact)
- Manage StatefulSets cluster-wide
- Manage StatefulSets in a namespace
- Create TokenReviews (validate arbitrary tokens)
- Create SubjectAccessReviews (check arbitrary permissions)
- Manage ServiceAccounts cluster-wide
- Manage ServiceAccounts in a namespace
- Manage Services cluster-wide
- Manage Services in a namespace
- List Namespaces (Cluster Reconnaissance)
- Manage Ingresses (Namespace Service Exposure/Traffic Redirection)
📦 Workloads (2)
| Kind | Name | Container | Image |
|---|---|---|---|
| Deployment | opentelemetry-operator | kube-rbac-proxy | quay.io/brancz/kube-rbac-proxy:v0.14.1 |
| Deployment | opentelemetry-operator | manager | ghcr.io/open-telemetry/opentelemetry-operator/opentelemetry-operator:v0.76.1 |