Using in-cluster access to k8s API server with the service account token mounted via `automountServiceAccountToken: true` configuration in AAP Automation Controller , it is possible to assume the identity of the service account and can potentially do anything that the service account is able to do.
This issue has been addressed in the following products: Red Hat Ansible Automation Platform 2.4 for RHEL 9 Red Hat Ansible Automation Platform 2.4 for RHEL 8 Via RHSA-2024:6428 https://access.redhat.com/errata/RHSA-2024:6428