integration-operator
v1.2.0
1 Service Accounts
1 Workloads
16 Bindings
5 Critical
1 High
1 Medium
9 Low
Description
bind a resource to a resource
Overview
Identity | Namespace | Automount | Secrets | Permissions | Workloads | Risk |
---|---|---|---|---|---|---|
integration-operator | default | ❌ | — | 16 | 1 | Critical |
Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.
Identities
🤖 integration-operator
Namespace: default
| Automount: ❌
🔑 Permissions (16)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole integration-operator | coordination.k8s.io/leases | create · delete · get · list · patch · update · watch | Critical | ControlPlaneDisruption CriticalNamespace DenialOfService LeaderElectionAbuse Tampering |
ClusterRole integration-operator | core/pods | create · delete · get · list · patch · update · watch | Critical | LateralMovement Persistence PotentialPrivilegeEscalation PrivilegeEscalation Tampering (+1 more) |
ClusterRole integration-operator | core/secrets | get · list · watch | Critical | ClusterWideSecretAccess CredentialAccess DataExposure InformationDisclosure SecretAccess |
ClusterRole integration-operator | core/serviceaccounts | impersonate | Critical | ClusterAdminAccess Impersonation PrivilegeEscalation Spoofing |
ClusterRole integration-operator | core/services | create · delete · get · list · patch · update · watch | Critical | DenialOfService NetworkManipulation ServiceExposure Tampering |
ClusterRole integration-operator | core/configmaps | get · list · watch | High | ConfigMapAccess DataExposure InformationDisclosure |
ClusterRole integration-operator | core/events | create · delete · get · list · patch · update · watch | Medium | InformationDisclosure OperationalData Reconnaissance |
ClusterRole integration-operator | integration.rock8s.com/deferredresources | create · delete · get · list · patch · update · watch | Low | |
ClusterRole integration-operator | integration.rock8s.com/deferredresources/finalizers | update | Low | |
ClusterRole integration-operator | integration.rock8s.com/deferredresources/status | get · patch · update | Low | |
ClusterRole integration-operator | integration.rock8s.com/plugs | create · delete · get · list · patch · update · watch | Low | |
ClusterRole integration-operator | integration.rock8s.com/plugs/finalizers | update | Low | |
ClusterRole integration-operator | integration.rock8s.com/plugs/status | get · patch · update | Low | |
ClusterRole integration-operator | integration.rock8s.com/sockets | create · delete · get · list · patch · update · watch | Low | |
ClusterRole integration-operator | integration.rock8s.com/sockets/finalizers | update | Low | |
ClusterRole integration-operator | integration.rock8s.com/sockets/status | get · patch · update | Low |
⚠️ Potential Abuse (15)
The following security risks were found based on the above permissions:
- Create pods cluster-wide
- Create pods in a namespace
- Update/Patch pods cluster-wide
- Update/Patch pods in a namespace
- Read secrets cluster-wide
- Read secrets in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Impersonate users, groups, or service accounts (cluster-wide)
- Read events cluster-wide
- Manage Services cluster-wide
- Manage Services in a namespace
- Manage Leases cluster-wide
- Manage Leases in kube-system or kube-node-lease namespace
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | integration-operator | integration-operator | registry.gitlab.com/bitspur/rock8s/integration-operator:1.2.0 |