Wildcard Permissions
Using wildcard (*) permissions in RBAC roles, granting excessive access to all resources or verbs within a namespace or cluster
Misconfigured Kubernetes Role-Based Access Control (RBAC) that allows users or service accounts to escalate privileges and gain unauthorized access to cluster resources. This includes overly permissive roles, wildcard permissions, and improper binding configurations that violate the principle of least privilege.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
Configuration changes required - see explanation below.
Using wildcard (*) permissions in RBAC roles, granting excessive access to all resources or verbs within a namespace or cluster
Sourcery automatically identifies kubernetes rbac privilege escalation and many other security issues in your codebase.