Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

default service account check #370

Open
tylergmuir opened this issue Nov 6, 2024 · 0 comments
Open

default service account check #370

tylergmuir opened this issue Nov 6, 2024 · 0 comments

Comments

@tylergmuir
Copy link




I think the check for if a pod is using the default service account should be informational instead of a warning. But there should be a warning if there is a role binding associated with the default account.

The thought process is that just having a pod with the default service account itself isn't an issue, but leveraging the default account with additional permissions likely provides permissions to too many things. But in the case a pod doesn't require any additional permissions within the cluster, leaving it as default I don't think should be seen as bad.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant