1 Service Accounts
1 Workloads
9 Bindings
3 Critical
2 Medium
4 Low
Description
bind a resource to a resource
Overview
Identity | Namespace | Automount | Secrets | Permissions | Workloads | Risk |
---|---|---|---|---|---|---|
resource-binding-operator | default | ❌ | — | 9 | 1 | Critical |
Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.
Identities
🤖 resource-binding-operator
Namespace: default
| Automount: ❌
🔑 Permissions (9)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole resource-binding-operator | * | get · list · watch | Critical | ClusterStructure ClusterWideAccess ClusterWideLogAccess ClusterWideSecretAccess ConfigMapAccess (+15 more) |
ClusterRole resource-binding-operator | core/configmaps | create · delete · get · list · patch · update · watch | Critical | ConfigMapAccess DataExposure InformationDisclosure PotentialPrivilegeEscalation Tampering |
ClusterRole resource-binding-operator | coordination.k8s.io/leases | create · delete · get · list · patch · update · watch | Critical | ControlPlaneDisruption CriticalNamespace DenialOfService LeaderElectionAbuse Tampering |
ClusterRole resource-binding-operator | authorization.k8s.io/subjectaccessreviews | create | Medium | InformationDisclosure RBACQuery |
ClusterRole resource-binding-operator | authentication.k8s.io/tokenreviews | create | Medium | CredentialAccess InformationDisclosure RBACQuery |
ClusterRole resource-binding-operator | core/events | create · patch | Low | |
ClusterRole resource-binding-operator | resourcebinding.rock8s.com/resourcebindings | create · delete · get · list · patch · update · watch | Low | |
ClusterRole resource-binding-operator | resourcebinding.rock8s.com/resourcebindings/finalizers | update | Low | |
ClusterRole resource-binding-operator | resourcebinding.rock8s.com/resourcebindings/status | get · patch · update | Low |
⚠️ Potential Abuse (26)
The following security risks were found based on the above permissions:
- Read secrets cluster-wide
- Read secrets in a namespace
- Read pod logs cluster-wide
- Read pod logs in a namespace
- Read ConfigMaps cluster-wide
- Read ConfigMaps in a namespace
- Modify ConfigMaps cluster-wide
- Modify ConfigMaps in a namespace
- Create TokenReviews (validate arbitrary tokens)
- Create SubjectAccessReviews (check arbitrary permissions)
- Read events cluster-wide
- Read RBAC configuration cluster-wide
- Manage Leases cluster-wide
- Manage Leases in kube-system or kube-node-lease namespace
- List Namespaces (Cluster Reconnaissance)
- List ValidatingWebhookConfigurations (Reconnaissance)
- List MutatingWebhookConfigurations (Reconnaissance)
- Read LimitRanges (Namespace Information Disclosure)
- Read ResourceQuotas (Namespace Information Disclosure)
- Read All ResourceQuotas (Cluster-wide Information Disclosure)
- Read ComponentStatuses (Control Plane Reconnaissance)
- Read CSINode Objects (Node & Storage Reconnaissance)
- Read CSIStorageCapacities (Namespace Storage Reconnaissance)
- Watch All Resources in a Namespace (Broad Information Disclosure)
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | resource-binding-operator | resource-binding-operator | registry.gitlab.com/bitspur/rock8s/resource-binding-operator:0.1.0 |