Tags
InformationDisclosure [37]
Reconnaissance [33]
DataExposure [30]
ConfigMapAccess [28]
PotentialPrivilegeEscalation [27]
Tampering [27]
CredentialAccess [24]
ClusterStructure [24]
SecretAccess [23]
ClusterWideSecretAccess [20]
Persistence [20]
PrivilegeEscalation [19]
DenialOfService [20]
WildcardPermission [16]
ClusterWideAccess [15]
RBACQuery [17]
WebhookReconnaissance [14]
WorkloadLifecycle [13]
WorkloadExecution [14]
LateralMovement [13]
ControlPlaneDisruption [12]
NodeAccess [12]
LogAccess [11]
NetworkManipulation [11]
OperationalData [12]
ServiceExposure [11]
CriticalNamespace [10]
StorageDetailsDisclosure [9]
ClusterWideLogAccess [9]
IdentityManagement [8]
ResourceConfiguration [8]
AvailabilityImpact [7]
BindingToPrivilegedRole [7]
CodeExecution [7]
PodExec [7]
QuotaTampering [7]
RBACManipulation [7]
DataLoss [5]
LeaderElectionAbuse [6]
ResourceDeletion [6]
Spoofing [5]
TrafficRedirection [5]
ClusterAdminAccess [5]
ClusterWidePodExec [5]
CRDManipulation [5]
ElevationOfPrivilege [5]
NamespaceLifecycle [5]
ResourceModification [4]
DeprecatedFeature [4]
Impersonation [3]
ManInTheMiddle [4]
PodSecurityPolicy [4]
WebhookManipulation [4]
ControllerRevisionTampering [2]
CSRCreation [3]
NamespaceAdmin [2]
NetworkPolicyManagement [2]
PodAttach [2]
PodPortForward [2]
SelfPermissionReviewQuery [2]
StorageManipulation [3]
TokenCreation [2]
WorkloadDeployment [2]
APIServerDoS [1]
APIServiceManipulation [1]
BackupAccess [1]
CertificateManagement [1]
ClusterWidePodAttach [1]
ClusterWidePodPortForward [1]
CSRApproval [1]
NodeManipulation [1]
SchedulingAbuse [1]
NamespaceWideAccess [1]