Ctadel
Ctadel
Overview
SECURITY
Findings
PLATFORM
Inventory
KubernetesIdentity
Explorer
Policies
Settings
You are on the public demo. All data is seeded, minor inconsistencies are expected.Contact us

Loading...

Loading filters...

Toxic Combinations

11 attack paths

Resources
98
CRITICALRDS publicly exposed with default admin passwordExposure1 resource
97
CRITICALPublic VM with critical CVE leaks DB credentials to a PII databaseExposure2 resources
96
CRITICALInternet to PII database via assumed role and cross-account snapshotExposure3 resources
95
CRITICALInternet-exposed VM with vulnerable Log4j -> DB with PIIExposure2 resources
92
CRITICALPublic bucket contains valid AWS access keysData Access1 resource
80
HIGHPod with NET_ADMIN can pivot to cluster-admin rolePrivilege Escalation1 resource
78
HIGHCross-cloud admin identity without MFAPrivilege Escalation2 resources
72
HIGHInternet-facing function reads sensitive bucketExposure2 resources
68
HIGHSnapshot with PII shared with another accountData Access1 resource
48
MEDIUMLateral movement: shared SSH key reused across staging and prodlateral_movement2 resources
22
LOWUnused public IP on stopped VMconfiguration2 resources