Join us

BadPods Series: Everything Allowed on AWS EKS

BadPods Series: Everything Allowed on AWS EKS

A security researcher ran a full-blown container escape on EKS using BadPods - a tool that spins up dangerously overprivileged pods. The pod broke out of its container, poked around the host node, moved laterally, and swiped AWS IAM creds.

All of it slipped past EKS’s default Pod Security Admission (PSA) policies. Why? Because those defaults still let pods declare risky stuff like hostPID, hostNetwork, privileged, and hostPath volumes. Basically, a welcome mat for escalation.


Give a Pawfive to this post!


Only registered users can post comments. Please, login or signup.

Start writing about what excites you in tech — connect with developers, grow your voice, and get rewarded.

Join other developers and claim your FAUN.dev() account now!

Avatar

Kaptain #Kubernetes

FAUN.dev()

@kaptain
Kubernetes Weekly Newsletter, Kaptain. Curated Kubernetes news, tutorials, tools and more!
Developer Influence
13

Influence

1

Total Hits

122

Posts