Description

Redpanda operator helm chart

Overview

IdentityNamespaceAutomountSecretsPermissionsWorkloadsRisk
operatordefault552Critical
operator-grafanadefault23Critical
operator-kube-prometheus-s-operatordefault281Critical
operator-kube-state-metricsdefault321Critical
operator-kube-prometheus-s-admissiondefault32Low
operator-kube-prometheus-s-prometheusdefault60Low
operator-grafana-testdefault01
operator-kube-prometheus-s-alertmanagerdefault00
operator-prometheus-node-exporterdefault01
operator-prometheus-windows-exporterdefault01

Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.


Identities

🤖 operator

Namespace: default  |  Automount:

🔑 Permissions (55)

RoleResourceVerbsRiskTags
ClusterRole operatorrbac.authorization.k8s.io/clusterrolebindingscreate · delete · get · list · patch · update · watchCriticalBindingToPrivilegedRole ClusterAdminAccess InformationDisclosure PrivilegeEscalation RBACManipulation (+2 more)
ClusterRole operatorrbac.authorization.k8s.io/clusterrolescreate · delete · get · list · patch · update · watchCriticalClusterAdminAccess InformationDisclosure PrivilegeEscalation RBACManipulation RBACQuery (+1 more)
Role operatorcoordination.k8s.io/leasescreate · delete · get · list · patch · update · watchCriticalControlPlaneDisruption CriticalNamespace DenialOfService Tampering
Role operator-election-rolecoordination.k8s.io/leasescreate · delete · get · list · patch · update · watchCriticalControlPlaneDisruption CriticalNamespace DenialOfService Tampering
Role operatorcore/secretscreate · delete · get · list · patch · update · watchCriticalCredentialAccess DataExposure InformationDisclosure Persistence PotentialPrivilegeEscalation (+2 more)
Role operatorcore/configmapscreate · delete · get · list · patch · update · watchHighConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering
Role operatorapps/deploymentscreate · delete · get · list · patch · update · watchHighPersistence PotentialPrivilegeEscalation Tampering WorkloadLifecycle
Role operatornetworking.k8s.io/ingressescreate · delete · get · list · patch · update · watchHighDenialOfService NetworkManipulation ServiceExposure Tampering
Role operatorbatch/jobscreate · delete · get · list · patch · update · watchHighPotentialPrivilegeEscalation Tampering WorkloadLifecycle
Role operatorcore/podscreate · delete · get · list · patch · update · watchHighLateralMovement Persistence PotentialPrivilegeEscalation Tampering WorkloadExecution
Role operatorrbac.authorization.k8s.io/rolebindingscreate · delete · get · list · patch · update · watchHighBindingToPrivilegedRole PrivilegeEscalation RBACManipulation
Role operatorrbac.authorization.k8s.io/rolescreate · delete · get · list · patch · update · watchHighPrivilegeEscalation RBACManipulation
Role operatorcore/servicescreate · delete · get · list · patch · update · watchHighDenialOfService NetworkManipulation ServiceExposure Tampering
Role operatorapps/statefulsetscreate · delete · get · list · patch · update · watchHighPersistence PotentialPrivilegeEscalation Tampering WorkloadLifecycle
Role operatorcore/serviceaccountscreate · delete · get · list · patch · update · watchMediumIdentityManagement PotentialPrivilegeEscalation Tampering
ClusterRole operator-proxy-roleauthorization.k8s.io/subjectaccessreviewscreateMediumInformationDisclosure RBACQuery
ClusterRole operator-proxy-roleauthentication.k8s.io/tokenreviewscreateMediumCredentialAccess InformationDisclosure RBACQuery
Role operatorsource.toolkit.fluxcd.io/bucketscreate · delete · get · list · patch · update · watchLow
Role operatorcert-manager.io/certificatescreate · delete · get · list · patch · update · watchLow
Role operatorcore/eventscreate · patchLow
Role operatorsource.toolkit.fluxcd.io/gitrepositoriescreate · delete · get · list · patch · update · watchLow
Role operatorsource.toolkit.fluxcd.io/gitrepositorycreate · delete · get · list · patch · update · watchLow
Role operatorsource.toolkit.fluxcd.io/gitrepository/finalizerscreate · delete · get · patch · updateLow
Role operatorsource.toolkit.fluxcd.io/gitrepository/statusget · patch · updateLow
Role operatorsource.toolkit.fluxcd.io/helmchartscreate · delete · get · list · patch · update · watchLow
Role operatorsource.toolkit.fluxcd.io/helmcharts/finalizerscreate · delete · get · patch · updateLow
Role operatorsource.toolkit.fluxcd.io/helmcharts/statusget · patch · updateLow
Role operatorhelm.toolkit.fluxcd.io/helmreleasescreate · delete · get · list · patch · update · watchLow
Role operatorhelm.toolkit.fluxcd.io/helmreleases/finalizersupdateLow
Role operatorhelm.toolkit.fluxcd.io/helmreleases/statusget · patch · updateLow
Role operatorsource.toolkit.fluxcd.io/helmrepositoriescreate · delete · get · list · patch · update · watchLow
Role operatorsource.toolkit.fluxcd.io/helmrepositories/finalizerscreate · delete · get · patch · updateLow
Role operatorsource.toolkit.fluxcd.io/helmrepositories/statusget · patch · updateLow
Role operatorautoscaling/horizontalpodautoscalerscreate · delete · get · list · patch · update · watchLow
Role operatorcert-manager.io/issuerscreate · delete · get · list · patch · update · watchLow
Role operatorcore/persistentvolumeclaimsdelete · get · list · patch · update · watchLow
Role operator-pvccore/persistentvolumeclaimsdelete · listLow
Role operatorpolicy/poddisruptionbudgetscreate · delete · get · list · patch · update · watchLow
Role operatormonitoring.coreos.com/podmonitorscreate · delete · get · list · patch · update · watchLow
Role operatorcore/pods/statuspatch · updateLow
ClusterRole operatorcluster.redpanda.com/redpandascreate · delete · get · list · patch · update · watchLow
ClusterRole operatorcluster.redpanda.com/redpandas/finalizersupdateLow
ClusterRole operatorcluster.redpanda.com/redpandas/statusget · patch · updateLow
Role operatorapps/replicasetscreate · delete · get · list · patch · update · watchLow
ClusterRole operatorcluster.redpanda.com/schemasget · list · patch · update · watchLow
ClusterRole operatorcluster.redpanda.com/schemas/finalizersupdateLow
ClusterRole operatorcluster.redpanda.com/schemas/statusget · patch · updateLow
Role operatormonitoring.coreos.com/servicemonitorscreate · delete · get · list · patch · update · watchLow
Role operatorapps/statefulsets/statuspatch · updateLow
ClusterRole operatorcluster.redpanda.com/topicsget · list · patch · update · watchLow
ClusterRole operatorcluster.redpanda.com/topics/finalizersupdateLow
ClusterRole operatorcluster.redpanda.com/topics/statusget · patch · updateLow
ClusterRole operatorcluster.redpanda.com/usersget · list · patch · update · watchLow
ClusterRole operatorcluster.redpanda.com/users/finalizersupdateLow
ClusterRole operatorcluster.redpanda.com/users/statusget · patch · updateLow

⚠️ Potential Abuse (21)

The following security risks were found based on the above permissions:

📦 Workloads (2)

KindNameContainerImage
Deploymentoperatorkube-rbac-proxygcr.io/kubebuilder/kube-rbac-proxy:v0.14.0
Deploymentoperatormanagerdocker.redpanda.com/redpandadata/redpanda-operator:v2.3.0-24.3.1

🤖 operator-kube-state-metrics

Namespace: default  |  Automount:

🔑 Permissions (32)

RoleResourceVerbsRiskTags
ClusterRole operator-kube-state-metricscore/secretslist · watchCriticalClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess
ClusterRole operator-kube-state-metricscore/configmapslist · watchHighConfigMapAccess DataExposure InformationDisclosure
ClusterRole operator-kube-state-metricsadmissionregistration.k8s.io/mutatingwebhookconfigurationslist · watchMediumInformationDisclosure Reconnaissance WebhookReconnaissance
ClusterRole operator-kube-state-metricscore/resourcequotaslist · watchMediumInformationDisclosure QuotaTampering Reconnaissance ResourceConfiguration
ClusterRole operator-kube-state-metricsadmissionregistration.k8s.io/validatingwebhookconfigurationslist · watchMediumInformationDisclosure Reconnaissance WebhookReconnaissance
ClusterRole operator-kube-state-metricscertificates.k8s.io/certificatesigningrequestslist · watchLow
ClusterRole operator-kube-state-metricsbatch/cronjobslist · watchLow
ClusterRole operator-kube-state-metricsapps/daemonsetslist · watchLow
ClusterRole operator-kube-state-metricsextensions/daemonsetslist · watchLow
ClusterRole operator-kube-state-metricsapps/deploymentslist · watchLow
ClusterRole operator-kube-state-metricsextensions/deploymentslist · watchLow
ClusterRole operator-kube-state-metricscore/endpointslist · watchLow
ClusterRole operator-kube-state-metricsautoscaling/horizontalpodautoscalerslist · watchLow
ClusterRole operator-kube-state-metricsextensions/ingresseslist · watchLow
ClusterRole operator-kube-state-metricsnetworking.k8s.io/ingresseslist · watchLow
ClusterRole operator-kube-state-metricsbatch/jobslist · watchLow
ClusterRole operator-kube-state-metricscoordination.k8s.io/leaseslist · watchLow
ClusterRole operator-kube-state-metricscore/limitrangeslist · watchLowInformationDisclosure Reconnaissance ResourceConfiguration
ClusterRole operator-kube-state-metricscore/namespaceslist · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole operator-kube-state-metricsnetworking.k8s.io/networkpolicieslist · watchLow
ClusterRole operator-kube-state-metricscore/nodeslist · watchLow
ClusterRole operator-kube-state-metricscore/persistentvolumeclaimslist · watchLow
ClusterRole operator-kube-state-metricscore/persistentvolumeslist · watchLow
ClusterRole operator-kube-state-metricspolicy/poddisruptionbudgetslist · watchLow
ClusterRole operator-kube-state-metricscore/podslist · watchLow
ClusterRole operator-kube-state-metricsapps/replicasetslist · watchLow
ClusterRole operator-kube-state-metricsextensions/replicasetslist · watchLow
ClusterRole operator-kube-state-metricscore/replicationcontrollerslist · watchLow
ClusterRole operator-kube-state-metricscore/serviceslist · watchLow
ClusterRole operator-kube-state-metricsapps/statefulsetslist · watchLow
ClusterRole operator-kube-state-metricsstorage.k8s.io/storageclasseslist · watchLow
ClusterRole operator-kube-state-metricsstorage.k8s.io/volumeattachmentslist · watchLow

⚠️ Potential Abuse (11)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentoperator-kube-state-metricskube-state-metricsregistry.k8s.io/kube-state-metrics/kube-state-metrics:v2.10.0

🤖 operator-kube-prometheus-s-operator

Namespace: default  |  Automount:

🔑 Permissions (28)

RoleResourceVerbsRiskTags
ClusterRole operator-kube-prometheus-s-operatorcore/configmaps*CriticalClusterWideAccess ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation (+2 more)
ClusterRole operator-kube-prometheus-s-operatorcore/secrets*CriticalClusterWideAccess ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure (+6 more)
ClusterRole operator-kube-prometheus-s-operatorapps/statefulsets*CriticalClusterWideAccess Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+2 more)
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/alertmanagerconfigs*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/alertmanagers*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/alertmanagers/finalizers*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/alertmanagers/status*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/podmonitors*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/probes*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/prometheusagents*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/prometheusagents/finalizers*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/prometheusagents/status*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/prometheuses*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/prometheuses/finalizers*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/prometheuses/status*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/prometheusrules*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/scrapeconfigs*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/servicemonitors*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/thanosrulers*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/thanosrulers/finalizers*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatormonitoring.coreos.com/thanosrulers/status*HighClusterWideAccess WildcardPermission
ClusterRole operator-kube-prometheus-s-operatorcore/endpointscreate · delete · get · updateLow
ClusterRole operator-kube-prometheus-s-operatornetworking.k8s.io/ingressesget · list · watchLow
ClusterRole operator-kube-prometheus-s-operatorcore/namespacesget · list · watchLowClusterStructure InformationDisclosure Reconnaissance
ClusterRole operator-kube-prometheus-s-operatorcore/nodeslist · watchLow
ClusterRole operator-kube-prometheus-s-operatorcore/podsdelete · listLow
ClusterRole operator-kube-prometheus-s-operatorcore/servicescreate · delete · get · updateLow
ClusterRole operator-kube-prometheus-s-operatorcore/services/finalizerscreate · delete · get · updateLow

⚠️ Potential Abuse (13)

The following security risks were found based on the above permissions:

📦 Workloads (1)

KindNameContainerImage
Deploymentoperator-kube-prometheus-s-operatorkube-prometheus-stackquay.io/prometheus-operator/prometheus-operator:v0.68.0

🤖 operator-grafana

Namespace: default  |  Automount:

🔑 Permissions (2)

RoleResourceVerbsRiskTags
ClusterRole operator-grafana-clusterrolecore/secretsget · list · watchCriticalClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess
ClusterRole operator-grafana-clusterrolecore/configmapsget · list · watchHighConfigMapAccess DataExposure InformationDisclosure

⚠️ Potential Abuse (5)

The following security risks were found based on the above permissions:

📦 Workloads (3)

KindNameContainerImage
Deploymentoperator-grafanagrafanadocker.io/grafana/grafana:10.1.2
Deploymentoperator-grafanagrafana-sc-dashboardquay.io/kiwigrid/k8s-sidecar:1.25.1
Deploymentoperator-grafanagrafana-sc-datasourcesquay.io/kiwigrid/k8s-sidecar:1.25.1

🤖 operator-kube-prometheus-s-prometheus

Namespace: default  |  Automount:

🔑 Permissions (6)

RoleResourceVerbsRiskTags
ClusterRole operator-kube-prometheus-s-prometheuscore/endpointsget · list · watchLow
ClusterRole operator-kube-prometheus-s-prometheusnetworking.k8s.io/ingressesget · list · watchLow
ClusterRole operator-kube-prometheus-s-prometheuscore/nodesget · list · watchLow
ClusterRole operator-kube-prometheus-s-prometheuscore/nodes/metricsget · list · watchLow
ClusterRole operator-kube-prometheus-s-prometheuscore/podsget · list · watchLow
ClusterRole operator-kube-prometheus-s-prometheuscore/servicesget · list · watchLow

⚠️ Potential Abuse (1)

The following security risks were found based on the above permissions:

📦 Workloads (0)

No workloads use this ServiceAccount.


🤖 operator-kube-prometheus-s-admission

Namespace: default  |  Automount:

🔑 Permissions (3)

RoleResourceVerbsRiskTags
ClusterRole operator-kube-prometheus-s-admissionadmissionregistration.k8s.io/mutatingwebhookconfigurationsget · updateLow
Role operator-kube-prometheus-s-admissioncore/secretscreate · getLow
ClusterRole operator-kube-prometheus-s-admissionadmissionregistration.k8s.io/validatingwebhookconfigurationsget · updateLow

⚠️ Potential Abuse (1)

The following security risks were found based on the above permissions:

📦 Workloads (2)

KindNameContainerImage
Joboperator-kube-prometheus-s-admission-createcreateregistry.k8s.io/ingress-nginx/kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6
Joboperator-kube-prometheus-s-admission-patchpatchregistry.k8s.io/ingress-nginx/kube-webhook-certgen:v20221220-controller-v1.5.1-58-g787ea74b6

🤖 operator-grafana-test

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
Podoperator-grafana-testoperator-testdocker.io/bats/bats:v1.4.1

🤖 operator-kube-prometheus-s-alertmanager

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (0)

No workloads use this ServiceAccount.


🤖 operator-prometheus-node-exporter

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
DaemonSetoperator-prometheus-node-exporternode-exporterquay.io/prometheus/node-exporter:v1.6.1

🤖 operator-prometheus-windows-exporter

Namespace: default  |  Automount:

🔑 Permissions (0)

No explicit RBAC bindings.

📦 Workloads (1)

KindNameContainerImage
DaemonSetoperator-prometheus-windows-exporterwindows-exporterghcr.io/prometheus-community/windows-exporter:0.22.0