2 Service Accounts
1 Workloads
54 Bindings
11 Critical
6 High
3 Medium
34 Low
Description
Redpanda operator helm chart
Overview
Identity | Namespace | Automount | Secrets | Permissions | Workloads | Risk |
---|---|---|---|---|---|---|
operator | default | ❌ | — | 54 | 1 | Critical |
operator-crd-job | default | ❌ | — | 0 | 0 | — |
Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.
Identities
🤖 operator
Namespace: default
| Automount: ❌
🔑 Permissions (54)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole operator-default | rbac.authorization.k8s.io/clusterrolebindings | create · delete · get · list · patch · update · watch | Critical | BindingToPrivilegedRole ClusterAdminAccess InformationDisclosure PrivilegeEscalation RBACManipulation (+2 more) |
ClusterRole operator-default | rbac.authorization.k8s.io/clusterroles | create · delete · get · list · patch · update · watch | Critical | ClusterAdminAccess InformationDisclosure PrivilegeEscalation RBACManipulation RBACQuery (+1 more) |
ClusterRole operator-default | core/configmaps | create · delete · get · list · patch · update · watch | Critical | ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering |
ClusterRole operator-default | apps/deployments | create · delete · get · list · patch · update · watch | Critical | Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle |
ClusterRole operator-default | batch/jobs | create · delete · get · list · patch · update · watch | Critical | PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle |
ClusterRole operator-default | coordination.k8s.io/leases | create · delete · get · list · patch · update · watch | Critical | ControlPlaneDisruption CriticalNamespace DenialOfService LeaderElectionAbuse Tampering |
ClusterRole operator-default | core/pods | create · delete · get · list · patch · update · watch | Critical | LateralMovement Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+1 more) |
ClusterRole operator-additional-controllers-default | core/secrets | get · list · watch | Critical | ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess |
ClusterRole operator-default | core/secrets | create · delete · get · list · patch · update · watch | Critical | ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure Persistence (+4 more) |
ClusterRole operator-default | core/services | create · delete · get · list · patch · update · watch | Critical | DenialOfService NetworkManipulation ServiceExposure Tampering |
ClusterRole operator-default | apps/statefulsets | create · delete · get · list · patch · update · watch | Critical | Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering WorkloadLifecycle |
ClusterRole operator-additional-controllers-default | core/configmaps | get · list · watch | High | ConfigMapAccess DataExposure InformationDisclosure |
ClusterRole operator-default | networking.k8s.io/ingresses | create · delete · get · list · patch · update · watch | High | DenialOfService NetworkManipulation ServiceExposure Tampering |
ClusterRole operator-default | core/pods/log | get · list | High | ClusterWideLogAccess DataExposure InformationDisclosure LogAccess |
ClusterRole operator-default | rbac.authorization.k8s.io/rolebindings | create · delete · get · list · patch · update · watch | High | BindingToPrivilegedRole InformationDisclosure PrivilegeEscalation RBACManipulation RBACQuery (+1 more) |
ClusterRole operator-default | rbac.authorization.k8s.io/roles | create · delete · get · list · patch · update · watch | High | InformationDisclosure PrivilegeEscalation RBACManipulation RBACQuery Reconnaissance |
ClusterRole operator-default | core/serviceaccounts | create · delete · get · list · patch · update · watch | High | IdentityManagement PotentialPrivilegeEscalation Tampering |
ClusterRole operator-default | policy/poddisruptionbudgets | create · delete · get · list · patch · update · watch | Medium | AvailabilityImpact DenialOfService Tampering |
ClusterRole operator-default | authorization.k8s.io/subjectaccessreviews | create | Medium | InformationDisclosure RBACQuery |
ClusterRole operator-default | authentication.k8s.io/tokenreviews | create | Medium | CredentialAccess InformationDisclosure RBACQuery |
ClusterRole operator-default | cert-manager.io/certificates | create · delete · get · list · patch · update · watch | Low | |
ClusterRole operator-default | apps/controllerrevisions | get · list · watch | Low | |
ClusterRole operator-default | core/endpoints | get · list | Low | |
ClusterRole operator-additional-controllers-default | core/events | create · patch | Low | |
ClusterRole operator-default | core/events | create · get · list · patch | Low | |
ClusterRole operator-default | autoscaling/horizontalpodautoscalers | create · delete · get · list · patch · update · watch | Low | |
ClusterRole operator-default | cert-manager.io/issuers | create · delete · get · list · patch · update · watch | Low | |
ClusterRole operator-default | core/limitranges | get · list | Low | |
ClusterRole operator-additional-controllers-default | core/nodes | get · list · watch | Low | |
ClusterRole operator-default | core/nodes | get | Low | |
ClusterRole operator-additional-controllers-default | core/persistentvolumeclaims | delete · get · list · patch · update · watch | Low | |
ClusterRole operator-default | core/persistentvolumeclaims | delete · get · list · watch | Low | |
ClusterRole operator-additional-controllers-default | core/persistentvolumes | delete · get · list · patch · update · watch | Low | |
ClusterRole operator-default | core/persistentvolumes | get · list · patch · watch | Low | |
ClusterRole operator-default | monitoring.coreos.com/podmonitors | create · delete · get · list · patch · update · watch | Low | |
ClusterRole operator-additional-controllers-default | core/pods | delete · get · list · watch | Low | |
ClusterRole operator-additional-controllers-default | cluster.redpanda.com/redpandas | get · list · watch | Low | |
ClusterRole operator-default | cluster.redpanda.com/redpandas | create · delete · get · list · patch · update · watch | Low | |
ClusterRole operator-default | cluster.redpanda.com/redpandas/finalizers | update | Low | |
ClusterRole operator-default | cluster.redpanda.com/redpandas/status | get · patch · update | Low | |
ClusterRole operator-default | core/replicationcontrollers | get · list | Low | |
ClusterRole operator-default | core/resourcequotas | get · list | Low | |
ClusterRole operator-default | cluster.redpanda.com/schemas | get · list · patch · update · watch | Low | |
ClusterRole operator-default | cluster.redpanda.com/schemas/finalizers | update | Low | |
ClusterRole operator-default | cluster.redpanda.com/schemas/status | get · patch · update | Low | |
ClusterRole operator-default | monitoring.coreos.com/servicemonitors | create · delete · get · list · patch · update · watch | Low | |
ClusterRole operator-additional-controllers-default | apps/statefulsets | get · list · watch | Low | |
ClusterRole operator-additional-controllers-default | apps/statefulsets/status | patch · update | Low | |
ClusterRole operator-default | cluster.redpanda.com/topics | get · list · patch · update · watch | Low | |
ClusterRole operator-default | cluster.redpanda.com/topics/finalizers | update | Low | |
ClusterRole operator-default | cluster.redpanda.com/topics/status | get · patch · update | Low | |
ClusterRole operator-default | cluster.redpanda.com/users | get · list · patch · update · watch | Low | |
ClusterRole operator-default | cluster.redpanda.com/users/finalizers | update | Low | |
ClusterRole operator-default | cluster.redpanda.com/users/status | get · patch · update | Low |
⚠️ Potential Abuse (36)
The following security risks were found based on the above permissions:
- Create pods cluster-wide
- Create pods in a namespace
- Update/Patch pods cluster-wide
- Update/Patch pods in a namespace
- Read secrets cluster-wide
- Read secrets in a namespace
- Modify secrets cluster-wide
- Modify secrets in a namespace
- Read pod logs cluster-wide
- Read pod logs in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Manage ClusterRoles (create, update, patch, delete)
- Manage ClusterRoleBindings (create, update, patch, delete)
- Manage Roles in a namespace (create, update, patch, delete)
- Manage RoleBindings in a namespace (create, update, patch, delete)
- Manage Deployments cluster-wide (potential for privileged pod execution)
- Manage Deployments in a namespace (potential for privileged pod execution)
- Manage StatefulSets cluster-wide
- Manage StatefulSets in a namespace
- Manage Jobs cluster-wide (one-off privileged execution)
- Manage Jobs in a namespace (one-off privileged execution)
- Create TokenReviews (validate arbitrary tokens)
- Create SubjectAccessReviews (check arbitrary permissions)
- Manage ServiceAccounts cluster-wide
- Manage ServiceAccounts in a namespace
- Manage Services cluster-wide
- Manage Services in a namespace
- Read RBAC configuration cluster-wide
- Manage PodDisruptionBudgets cluster-wide
- Manage Leases cluster-wide
- Manage Leases in kube-system or kube-node-lease namespace
- Manage Ingresses (Namespace Service Exposure/Traffic Redirection)
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | operator | manager | docker.redpanda.com/redpandadata/redpanda-operator:v25.2.1-beta1 |
🤖 operator-crd-job
Namespace: default
| Automount: ❌
🔑 Permissions (0)
No explicit RBAC bindings.
📦 Workloads (0)
No workloads use this ServiceAccount.