The cluster was on fire. Not from heat, but from risk. Kubectl had pulled more code than you thought possible, and now every dependency was a question mark.
Third-party risk in Kubernetes is not rare. Operators bring in open-source tools, CRDs, Helm charts, and plugins without full visibility. Each one can be a new attack surface. Kubectl makes interaction with the cluster fast, but it also makes importing risk fast.
A Kubectl third-party risk assessment starts by mapping assets. Identify every pod, service, and resource connected to external code. Check source origins. Verify signatures. Audit RBAC permissions granted through third-party components.
Run vulnerability scans on container images and base layers. Track CVEs linked to packages used by your custom resources. Monitor APIs exposed by non-core services. Third-party controllers can hold more privilege than expected; test them in isolation to find privilege escalation paths.