vault
v0.30.0
2 Service Accounts
3 Workloads
1 Bindings
1 Medium
Description
Official HashiCorp Vault Chart
- https://github.com/hashicorp/vault
- https://github.com/hashicorp/vault-helm
- https://github.com/hashicorp/vault-k8s
- https://github.com/hashicorp/vault-csi-provider
Overview
Identity | Namespace | Automount | Secrets | Permissions | Workloads | Risk |
---|---|---|---|---|---|---|
vault-agent-injector | default | ❌ | — | 1 | 1 | Medium |
vault | default | ❌ | — | 0 | 1 | — |
Numbers in the last two columns indicate how many bindings or workloads involve each ServiceAccount.
Identities
🤖 vault-agent-injector
Namespace: default
| Automount: ❌
🔑 Permissions (1)
Role | Resource | Verbs | Risk | Tags |
---|---|---|---|---|
ClusterRole vault-agent-injector-clusterrole | admissionregistration.k8s.io/mutatingwebhookconfigurations | get · list · patch · watch | Medium | InformationDisclosure Reconnaissance WebhookReconnaissance |
⚠️ Potential Abuse (2)
The following security risks were found based on the above permissions:
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
Deployment | vault-agent-injector | sidecar-injector | hashicorp/vault-k8s:1.6.2 |
🤖 vault
Namespace: default
| Automount: ❌
🔑 Permissions (0)
No explicit RBAC bindings.
📦 Workloads (1)
Kind | Name | Container | Image |
---|---|---|---|
StatefulSet | vault | vault | hashicorp/vault:1.19.0 |