Description

Redpanda operator helm chart

Overview

IdentityNamespaceAutomountSecretsPermissionsWorkloadsRisk
operatordefault402Critical
operator-grafanadefault32Critical
operator-kube-prometheus-s-operatordefault221Critical
operator-kube-state-metricsdefault321Critical
operator-grafana-testdefault11Low
operator-kube-prometheus-s-admissiondefault42Low
operator-kube-prometheus-s-alertmanagerdefault10Low
operator-kube-prometheus-s-prometheusdefault70Low
operator-prometheus-node-exporterdefault11Low

Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.


Identities

🤖 operator

Namespace: default  |  Automount:

🔑 Permissions (40)

RoleResourceVerbsRiskTags
Role operatorcoordination.k8s.io/leasescreate · delete · get · list · patch · update · watchCriticalControlPlaneDisruption CriticalNamespace DenialOfService Tampering
Role operator-election-rolecoordination.k8s.io/leasescreate · delete · get · list · patch · update · watchCriticalControlPlaneDisruption CriticalNamespace DenialOfService Tampering
Role operatorcore/secretscreate · delete · get · list · patch · update · watchCriticalCredentialAccess DataExposure InformationDisclosure Persistence PotentialPrivilegeEscalation (+2 more)
Role operatorcore/configmapscreate · delete · get · list · patch · update · watchHighConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering
Role operatorapps/deploymentscreate · delete · get · patch · updateHighPersistence PotentialPrivilegeEscalation Tampering WorkloadLifecycle
Role operatorbatch/jobscreate · delete · get · list · patch · update · watchHighPotentialPrivilegeEscalation Tampering WorkloadLifecycle
Role operatorcore/podscreate · delete · get · list · patch · update · watchHighLateralMovement Persistence PotentialPrivilegeEscalation Tampering WorkloadExecution
Role operatorrbac.authorization.k8s.io/rolebindingscreate · delete · get · list · patch · update · watchHighBindingToPrivilegedRole PrivilegeEscalation RBACManipulation
Role operatorrbac.authorization.k8s.io/rolescreate · delete · get · list · patch · update · watchHighPrivilegeEscalation RBACManipulation
Role operatorcore/servicescreate · delete · get · list · patch · update · watchHighDenialOfService NetworkManipulation ServiceExposure Tampering
Role operatorapps/statefulsetscreate · delete · get · list · patch · update · watchHighPersistence PotentialPrivilegeEscalation Tampering WorkloadLifecycle
Role operatorcore/serviceaccountscreate · delete · get · list · patch · update · watchMediumIdentityManagement PotentialPrivilegeEscalation Tampering
Role operatorsource.toolkit.fluxcd.io/bucketscreate · delete · get · list · patch · update · watchLow
Role operatorcert-manager.io/certificatescreate · delete · get · patch · updateLow
Role operatorcore/eventscreate · patchLow
Role operatorsource.toolkit.fluxcd.io/gitrepositoriescreate · delete · get · list · patch · update · watchLow
Role operatorsource.toolkit.fluxcd.io/helmchartscreate · delete · get · list · patch · update · watchLow
Role operatorsource.toolkit.fluxcd.io/helmcharts/finalizerscreate · delete · get · patch · updateLow
Role operatorsource.toolkit.fluxcd.io/helmcharts/statusget · patch · updateLow
Role operatorhelm.toolkit.fluxcd.io/helmreleasescreate · delete · get · list · patch · update · watchLow
Role operatorhelm.toolkit.fluxcd.io/helmreleases/finalizersupdateLow
Role operatorhelm.toolkit.fluxcd.io/helmreleases/statusget · patch · updateLow
Role operatorsource.toolkit.fluxcd.io/helmrepositoriescreate · delete · get · list · patch · update · watchLow
Role operatorsource.toolkit.fluxcd.io/helmrepositories/finalizerscreate · delete · get · patch · updateLow
Role operatorsource.toolkit.fluxcd.io/helmrepositories/statusget · patch · updateLow
Role operatorcert-manager.io/issuerscreate · delete · get · patch · updateLow
Role operator-election-rolecore/leasescreate · delete · get · list · patch · update · watchLow
ClusterRole operatorcore/nodesget · list · watchLow
Role operatorcore/persistentvolumeclaimsdelete · get · list · patch · update · watchLow
Role operator-pvccore/persistentvolumeclaimsdelete · listLow
ClusterRole operatorcore/persistentvolumesdelete · get · list · patch · update · watchLow
Role operatorpolicy/poddisruptionbudgetscreate · delete · get · patch · updateLow
Role operatorcluster.redpanda.com/redpandascreate · delete · get · list · patch · update · watchLow
Role operatorcluster.redpanda.com/redpandas/finalizersupdateLow
Role operatorcluster.redpanda.com/redpandas/statusget · patch · updateLow
Role operatorapps/replicasetscreate · delete · get · list · patch · update · watchLow
Role operatormonitoring.coreos.com/servicemonitorscreate · delete · get · list · patch · update · watchLow
Role operatorcluster.redpanda.com/topicscreateLow
Role operatorcluster.redpanda.com/topics/finalizersupdateLow
Role operatorcluster.redpanda.com/topics/statusget · patch · updateLow

⚠️ Potential Abuse (15)

The following security risks were found based on the above permissions:

📦 Workloads (2)

KindNameContainerImage
Deploymentoperatorkube-rbac-proxygcr.io/kubebuilder/kube-rbac-proxy:v0.8.0
Deploymentoperatormanagerdocker.redpanda.com/redpandadata/redpanda-operator:v23.2.7

🤖 operator-kube-state-metrics

Namespace: default  |  Automount:

🔑 Permissions (32)

RoleResourceVerbsRiskTags
ClusterRole operator-kube-state-metricscore/secretslist · watchCriticalClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess
ClusterRole operator-kube-state-metricscore/configmapslist · watchHighConfigMapAccess DataExposure InformationDisclosure
ClusterRole operator-kube-state-metricsadmissionregistration.k8s.io/mutatingwebhookconfigurationslist · watchMediumInformationDisclosure Reconnaissance WebhookReconnaissance
ClusterRole operator-kube-state-metricscore/resourcequotaslist · watchMediumInformationDisclosure QuotaTampering Reconnaissance ResourceConfiguration
ClusterRole operator-kube-state-metricsadmissionregistration.k8s.io/validatingwebhookconfigurationslist · watchMediumInformationDisclosure Reconnaissance WebhookReconnaissance
ClusterRole operator-kube-state-metricscertificates.k8s.io/certificatesigningrequestslist · watchLow
ClusterRole operator-kube-state-metricsbatch/cronjobslist · watchLow
ClusterRole operator-kube-state-metricsapps/daemonsetslist · watchLow
ClusterRole operator-kube-state-metricsextensions/daemonsetslist · watchLow
ClusterRole operator-kube-state-metricsapps/deploymentslist · watchLow
ClusterRole operator-kube-state-metricsextensions/deploymentslist · watchLow
ClusterRole operator-kube-state-metricscore/endpointslist · watchLow
ClusterRole operator-kube-state-metricsautoscaling/horizontalpodautoscalerslist · watchLow
ClusterRole operator-kube-state-metricsextensions/ingresseslist · watchLow
ClusterRole operator-kube-state-metricsnetworking.k8s.io/ingresseslist · watchLow
ClusterRole operator-kube-state-metricsbatch/jobslist · watchLow
ClusterRole operator-kube-state-metricscore/limitrangeslist · watchLowInformationDisclosure Reconnaissance ResourceConfiguration
ClusterRole operator-kube-state-metricscore/namespaceslist · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole operator-kube-state-metricsnetworking.k8s.io/networkpolicieslist · watchLow
ClusterRole operator-kube-state-metricscore/nodeslist · watchLow
ClusterRole operator-kube-state-metricscore/persistentvolumeclaimslist · watchLow
ClusterRole operator-kube-state-metricscore/persistentvolumeslist · watchLow
ClusterRole operator-kube-state-metricspolicy/poddisruptionbudgetslist · watchLow
ClusterRole operator-kube-state-metricscore/podslist · watchLow
ClusterRole operator-kube-state-metricsapps/replicasetslist · watchLow
ClusterRole operator-kube-state-metricsextensions/replicasetslist · watchLow
ClusterRole operator-kube-state-metricscore/replicationcontrollerslist · watchLow
ClusterRole operator-kube-state-metricscore/serviceslist · watchLow
ClusterRole operator-kube-state-metricsapps/statefulsetslist · watchLow
ClusterRole operator-kube-state-metricsstorage.k8s.io/storageclasseslist · watchLow
ClusterRole operator-kube-state-metricsstorage.k8s.io/volumeattachmentslist · watchLow
ClusterRole psp-operator-kube-state-metricspolicy/podsecuritypolicies (restricted to: operator-kube-state-metrics)useLowDeprecatedFeature NodeAccess PodSecurityPolicy PrivilegeEscalation ResourceNameRestricted

⚠️ Potential Abuse (12)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentoperator-kube-state-metricskube-state-metricsk8s.gcr.io/kube-state-metrics/kube-state-metrics:v1.9.8

🤖 operator-kube-prometheus-s-operator

Namespace: default  |  Automount:

🔑 Permissions (22)

RoleResourceVerbsRiskTags
ClusterRole operator-kube-prometheus-s-operatorcore/configmaps*CriticalClusterWideAccess ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation (+2 more)
ClusterRole operator-kube-prometheus-s-operatorcore/secrets*CriticalClusterWideAccess ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure (+6 more)
ClusterRole operator-kube-prometheus-s-operatorapps/statefulsets*CriticalClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more)
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/alertmanagerconfigs*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/alertmanagers*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/alertmanagers/finalizers*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/podmonitors*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/probes*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/prometheuses*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/prometheuses/finalizers*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/prometheusrules*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/servicemonitors*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/thanosrulers*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/thanosrulers/finalizers*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatorcore/endpointscreate · delete · get · updateLow
ClusterRole operator-kube-prometheus-s-operatornetworking.k8s.io/ingressesget · list · watchLow
ClusterRole operator-kube-prometheus-s-operatorcore/namespacesget · list · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole operator-kube-prometheus-s-operatorcore/nodeslist · watchLow
ClusterRole operator-kube-prometheus-s-operatorcore/podsdelete · listLow
ClusterRole operator-kube-prometheus-s-operatorcore/servicescreate · delete · get · updateLow
ClusterRole operator-kube-prometheus-s-operatorcore/services/finalizerscreate · delete · get · updateLow
ClusterRole operator-kube-prometheus-s-operator-psppolicy/podsecuritypolicies (restricted to: operator-kube-prometheus-s-operator)useLowDeprecatedFeature NodeAccess PodSecurityPolicy PrivilegeEscalation ResourceNameRestricted

⚠️ Potential Abuse (14)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentoperator-kube-prometheus-s-operatorkube-prometheus-stackquay.io/prometheus-operator/prometheus-operator:v0.45.0

🤖 operator-grafana

Namespace: default  |  Automount:

🔑 Permissions (3)

RoleResourceVerbsRiskTags
ClusterRole operator-grafana-clusterrolecore/secretsget · list · watchCriticalClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess
ClusterRole operator-grafana-clusterrolecore/configmapsget · list · watchHighConfigMapAccess DataExposure InformationDisclosure
Role operator-grafanaextensions/podsecuritypolicies (restricted to: operator-grafana)useLowResourceNameRestricted

⚠️ Potential Abuse (5)

The following security risks were found based on the above permissions:

📦 Workloads (2)

KindNameContainerImage
Deploymentoperator-grafanagrafanagrafana/grafana:7.4.2
Deploymentoperator-grafanagrafana-sc-dashboardquay.io/kiwigrid/k8s-sidecar:1.10.6

🤖 operator-kube-prometheus-s-prometheus

Namespace: default  |  Automount:

🔑 Permissions (7)

RoleResourceVerbsRiskTags
ClusterRole operator-kube-prometheus-s-prometheuscore/endpointsget · list · watchLow
ClusterRole operator-kube-prometheus-s-prometheusnetworking.k8s.io/ingressesget · list · watchLow
ClusterRole operator-kube-prometheus-s-prometheuscore/nodesget · list · watchLow
ClusterRole operator-kube-prometheus-s-prometheuscore/nodes/metricsget · list · watchLow
ClusterRole operator-kube-prometheus-s-prometheuscore/podsget · list · watchLow
ClusterRole operator-kube-prometheus-s-prometheuscore/servicesget · list · watchLow
ClusterRole operator-kube-prometheus-s-prometheus-psppolicy/podsecuritypolicies (restricted to: operator-kube-prometheus-s-prometheus)useLowDeprecatedFeature NodeAccess PodSecurityPolicy PrivilegeEscalation ResourceNameRestricted

⚠️ Potential Abuse (2)

The following security risks were found based on the above permissions:

📦 Workloads (0)

No workloads use this ServiceAccount.


🤖 operator-kube-prometheus-s-admission

Namespace: default  |  Automount:

🔑 Permissions (4)

RoleResourceVerbsRiskTags
ClusterRole operator-kube-prometheus-s-admissionadmissionregistration.k8s.io/mutatingwebhookconfigurationsget · updateLow
Role operator-kube-prometheus-s-admissioncore/secretscreate · getLow
ClusterRole operator-kube-prometheus-s-admissionadmissionregistration.k8s.io/validatingwebhookconfigurationsget · updateLow
ClusterRole operator-kube-prometheus-s-admissionpolicy/podsecuritypolicies (restricted to: operator-kube-prometheus-s-admission)useLowDeprecatedFeature NodeAccess PodSecurityPolicy PrivilegeEscalation ResourceNameRestricted

⚠️ Potential Abuse (2)

The following security risks were found based on the above permissions:

📦 Workloads (2)

KindNameContainerImage
Joboperator-kube-prometheus-s-admission-createcreatejettech/kube-webhook-certgen:v1.5.0
Joboperator-kube-prometheus-s-admission-patchpatchjettech/kube-webhook-certgen:v1.5.0

🤖 operator-grafana-test

Namespace: default  |  Automount:

🔑 Permissions (1)

RoleResourceVerbsRiskTags
Role operator-grafana-testpolicy/podsecuritypolicies (restricted to: operator-grafana-test)useLowResourceNameRestricted

⚠️ Potential Abuse (1)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Podoperator-grafana-testoperator-testbats/bats:v1.1.0

🤖 operator-kube-prometheus-s-alertmanager

Namespace: default  |  Automount:

🔑 Permissions (1)

RoleResourceVerbsRiskTags
Role operator-kube-prometheus-s-alertmanagerpolicy/podsecuritypolicies (restricted to: operator-kube-prometheus-s-alertmanager)useLowResourceNameRestricted

⚠️ Potential Abuse (1)

The following security risks were found based on the above permissions:

📦 Workloads (0)

No workloads use this ServiceAccount.


🤖 operator-prometheus-node-exporter

Namespace: default  |  Automount:

🔑 Permissions (1)

RoleResourceVerbsRiskTags
ClusterRole psp-operator-prometheus-node-exporterextensions/podsecuritypolicies (restricted to: operator-prometheus-node-exporter)useLowDeprecatedFeature NodeAccess PodSecurityPolicy PrivilegeEscalation ResourceNameRestricted

⚠️ Potential Abuse (2)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
DaemonSetoperator-prometheus-node-exporternode-exporterquay.io/prometheus/node-exporter:v1.0.1