1 Service Accounts
0 Workloads
3 Bindings
1 Critical
2 High
Description
Helm Chart for Capsule Proxy, addon for Capsule, the multi-tenant Operator
Overview
| Identity | Namespace | Automount | Secrets | Permissions | Workloads | Risk |
|---|---|---|---|---|---|---|
(orphaned-bindings) | — | — | — | 3 | 0 | Critical |
Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.
Identities
⚠️ (orphaned-bindings)
Warning: The following RBAC bindings exist but are not associated with any active service accounts in the cluster.
🔑 Permissions (3)
| Role | Resource | Verbs | Risk | Tags |
|---|---|---|---|---|
Role capsule-proxy:capsule-proxy | coordination.k8s.io/leases | create · delete · get · list · patch · update · watch | Critical | ControlPlaneDisruption CriticalNamespace DenialOfService Tampering |
Role capsule-proxy:capsule-proxy | core/configmaps | create · delete · get · list · patch · update · watch | High | ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering |
Role capsule-proxy:capsule-proxy | core/endpoints | create · delete · get · list · patch · update · watch | High | DenialOfService NetworkManipulation Tampering TrafficRedirection |
⚠️ Potential Abuse (5)
The following security risks were found based on the above permissions:
- Read ConfigMaps in a namespace
- Modify ConfigMaps in a namespace
- Manage Endpoints or EndpointSlices in a namespace
- Manage Leases in kube-system or kube-node-lease namespace