Skip to content

controlplaneio/badrobot

BadRobot Logo Security Analysis Go Report Card GitHub release (latest SemVer)

BadRobot is a tool to perform security auditing of Kubernetes Operators. Operators are software extensions to Kubernetes that make use of custom resources to manage applications and their components. Operators follow Kubernetes principles, notably the control loop. These extensions usually run within the Kubernetescluster, but it could just as well interact with the cluster from the outside with appropriate authentication.

BadRobot statically analyses Operator manifest files for high risk configurations such as lack of security restrictions on the deployed controller and the permissions of an associated RBAC ClusteRole. The risk analysis that BadRobot evaluates is primarily focussed on the likelihood that a compromised Operator would be able to carry privilege escalation and obtain full control over every resource in the and in all namespaces.

Prerequisites

BadRobot requires the Operator manifests to be bundled into a single file, rather than scanning an entire directory structure and analysing individual manifests.

Install

BadRobot can be run either as a container or as a local go binary.

Go 1.17+

$ go install github.com/controlplaneio/badrobot@latest

Command Line Usage

$ badrobot scan --help
Scans Kubernetes Operator resource YAML or JSON

Usage:
  badrobot scan [file] [flags]

Examples:
  badrobot scan ./operator.yaml

Flags:
      --absolute-path       use the absolute path for the file name
      --debug               turn on debug logs
      --exit-code int       Set the exit-code to use on failure (default 2)
  -f, --format string       Set output format (json, template) (default "json")
  -h, --help                help for scan
  -o, --output string       Set output location
      --schema-dir string   Sets the directory for the json schemas
  -t, --template string     Set output template, it will check for a file or read input as the

Usage Example

$ cat <<EOF > operator.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  name: example-operator
rules:
- apiGroups:
  - "*"
  resources:
  - "*"
  verbs:
  - "*"
EOF
$ badrobot scan operator.yaml

Docker usage:

Run the same command in Docker:

$ docker run -i controlplane/badrobot scan /dev/stdin < operator.yaml

BadRobot Rulesets

RuleSet ID Rule Risk Risk Level
OPR-R1-NS default Namespace The Operator is deployed onto the default namespace. Operators should be deployed into a dedicated namespace to reduce the exposure of other sensitive information or workloads in the event of compromise. The default namespace is where applications and services are deployed if the namespaces is not specified. A compromised application container could pivot to the Operator which may allow an adversary to obtain cluster wide permissions. Low
OPR-R2-NS kube-system Namespace The Operator is deployed onto the kube-system namespace. Operators should be deployed into a dedicated namespace to reduce the exposure of other sensitive information or workloads in the event of compromise. The kube-system namespace is reserved for Kubernetes engine and the Operator should not be deployed here. High
OPR-R3-SC No securityContext The Operator is deployed without a securityContext. In the event the Operator is compromised, the adversary could have unrestricted access to resources on the underlying host. Unless the Operator is performing highly permissive cluster configuration and management of resources, it is highly recommended to some restrictions are applied. High
OPR-R4-SC securityContext set to allowPrivilegeEscalation: true The Operator is deployed with privilege escalation permissions which in the event of a compromise would allow adversary root access to the underlying host. By default, the Operator-SDK sets allowPrivilegeEscalation: false and must be explicitly removed or modified in the deployment manifest. High
OPR-R5-SC securityContext set to privileged: true The Operator is deployed with all of the system root’s capabilities. In the event the Operator is compromised, the Adversary would have unrestricted access to resources on the underlying host. Critical
OPR-R6-SC securityContext set to readOnlyRootFilesystem: false The Operator is deployed with write access to the underlying host. In the event the Operator is compromised and the Operator has mount access, an adversary would be able to write to root filesystem to obtain full system compromise. Medium
OPR-R7-SC securityContext set to runAsNonRoot: false The Operator is configured to run as root. If the Operator has access to the underlying host it will have the same access as host root account. By default, the Operator-SDK sets runAsNonRoot: true and must be explicitly removed or modified in the deployment manifest. High
OPR-R8-SC securityContext set to runAsUser: 0 The Operator is configured to run as root. If the Operator has access to the underlying host it will have the same access as host root account. By default, the Operator-SDK sets runAsNonRoot: true and must be explicitly removed or modified in the deployment manifest. High
OPR-R9-SC securityContext adds CAP_SYS_ADMIN Linux capability The Operator is configured with CAP_SYS_ADMIN enabled, removing any previously dropped Linux capabilities. CAP_SYS_ADMIN is an overloaded capability allowing system administrative operations and can lead to privilege escalation on the host if the Operator is compromised. Critical
OPR-R10-RBAC Runs as Cluster Admin The Operator runs as default cluster role, cluster admin. Even if the Operator requires full cluster administration, this role should not be used and dedicated one instead. It is recommended that the permissions of the Operator are reviewed and redefined. Critical
OPR-R11-RBAC ClusterRole has full permissions over all resources The Operator runs with a cluster role with full access (*) to all resources (*). Even if the Operator requires full cluster administration, the cluster role should explicitly define apigroups, resources and verbs it requires access to. It is recommended that the permissions of the Operator are reviewed and redefined. Critical
OPR-R12-RBAC ClusterRole has full permissions over all CoreAPI resources The Operator runs with a cluster role with full access (*) to CoreAPI resources (*). Even if the Operator requires full access to all CoreAPI resources, the cluster role should explicitly define resources and verbs it requires. It is recommended that the permissions of the Operator are reviewed and redefined. Critical
OPR-R13-RBAC ClusterRole has full permissions over ClusterRoles and ClusterRoleBindings The Operator runs with a cluster role which has unrestricted access to ClusterRoles and ClusterRoleBindings. In the event of a compromise, an adversary would be able to rebind the Operator service account with full access to cluster wide resources. High
OPR-R14-RBAC ClusterRole has access to Kubernetes secrets The Operator is deployed with access to all secrets across the cluster. Accessing this level of cluster wide secrets may allow an adversary a method of privilege escalation. It is highly recommended that a dedicated role is used for accessing specific secrets the Operator requires to manage and use. High
OPR-R15-RBAC ClusterRole can exec into Pods The Operator is deployed with a cluster role that allows remote access to any Pod in the cluster. In the event the Operator is compromised, the adversary would be able to pivot to different containers to attempt escape isolation or access sensitive information. High
OPR-R16-RBAC ClusterRole has escalate permissions The Operator is deployed with the escalation privilege, allowing the cluster role grant privileges beyond the permissions that are bound to the Operator. Due to this reason, it is recommended that Operators are not given the escalate privilege. High
OPR-R17-RBAC ClusterRole has bind permissions The Operator is deployed with the bind privilege, allowing the cluster role to create bindings of roles beyond the permissions granted to the Operator. Due to this reason, it is recommended that Operators are not given the bind privilege. High
OPR-R18-RBAC ClusterRole has impersonate permissions The Operator is deployed with the impersonate privilege, allowing the cluster role to gain the rights of another role. This permission would allow an adversary (with access to the Operator) to masquerade as another as another role to perform malicious actions on cluster resources. Due to this, it is recommended that Operators are not given the impersonate privilege. Critical
OPR-R19-RBAC ClusterRole can modify pod logs The Operator is deployed with full permissions over pod logs. The permission can be abused by an adversary to remove or overwrite pod logs masking malicious actions performed against pod resources. Low
OPR-R20-RBAC ClusterRole can remove Kubernetes events The Operator is deployed with access to deleting Kubernetes events. In the event the Operator is compromised, an Adversary would be able to remove Kubernetes events and hide previous malicious actions. Low
OPR-R21-RBAC ClusterRole has full permissions over any custom resource definitions The Operator is deployed with full permissions over any custom resource definition, allowing the modification of custom resources managed by another Operator. The cluster role or role must only be scoped to custom resources managed by the Operator. In the event the Operator is compromised or a malicious Operator is deployed, it would allow an adversary to manipulate custom resources. High
OPR-R22-RBAC ClusterRole has full permissions over admission controllers The Operator is deployed with full permissions over Kubernetes admission controllers which can allow an adversary to read or modify submitted resources. High
OPR-R23-RBAC ClusterRole has permissions over service account token creation The Operator has full permissions over cluster wide service accounts, allowing the creation of token requests for existing service accounts. This can be abused by an adversary to masquerade as another user to access cluster resources. High
OPR-R24-RBAC ClusterRole has read, write or delete permissions over persistent volumes The Operator is deployed with read, write or delete permissions for volume mount, allowing root filesystem access and exposing sensitive information. High
OPR-R25-RBAC ClusterRole has modify permissions over network policies The Operator is deployed with access to cluster wide network policies, allowing the modification of network routes. An adversary can leverage these permissions to access unauthorised resources. Medium
OPR-R26-RBAC ClusterRole has permissions over the Kubernetes API server proxy The Operator is deployed with permissions over the proxy sub resource of the node, allowing command execution on every pod on the node via the Kubelet API. An adversary can leverage this permission on the Operator to run custom workloads on several pods on the node. High

Roadmap

There are plans to extend BadRobot in the future to consider the following manifests:

  1. kind: Role - The analysis of roles can be included to determine whether they are bound to a dedicated namespace, whether they only have access to specific custom resources, etc.
  2. kind: Namespace (Pod Security Standards) - The analysis could determine whether Pod Security Standards are applied for Kubernetes Clusters v1.23 and above.
  3. kind: NetworkPolicy - Analyse whether network policies are being applied to the Operator