Container Escape
How an attacker can break out of a container and gain control over the host system in Kubernetes.
How an attacker can break out of a container and gain control over the host system in Kubernetes.
How attackers exploit Kubernetes default group merging behavior to inject unauthorized supplemental group IDs from container images into running pod processes.
How to use supplementalGroupsPolicy: Strict to prevent container images from injecting unauthorized supplemental group IDs into Kubernetes pod processes.
Why the gitRepo volume driver was removed in Kubernetes v1.36, and how to migrate existing workloads to the init container pattern recommended by kubernetes.io.
How to use Linux user namespaces in Kubernetes pods to isolate container UIDs from the host and reduce the blast radius of container escapes.