iam.gke.io/gcp-service-account
annotation as that indicates that the SA can access something in GCP. Another option would be to try to abuse each KSA in the cluster and check if it has access.
From GCP is always interesting to enumerate the bindings and know which access are you giving to SAs inside Kubernetes.AWS_WEB_IDENTITY_TOKEN_FILE
(default: /var/run/secrets/eks.amazonaws.com/serviceaccount/token
)