Join us

BadPods Series: Everything Allowed on AWS EKS

BadPods Series: Everything Allowed on AWS EKS

A security researcher ran a full-blown container escape on EKS using BadPods - a tool that spins up dangerously overprivileged pods. The pod broke out of its container, poked around the host node, moved laterally, and swiped AWS IAM creds.

All of it slipped past EKS’s default Pod Security Admission (PSA) policies. Why? Because those defaults still let pods declare risky stuff like hostPID, hostNetwork, privileged, and hostPath volumes. Basically, a welcome mat for escalation.


Let's keep in touch!

Stay updated with my latest posts and news. I share insights, updates, and exclusive content.

Unsubscribe anytime. By subscribing, you share your email with @kaptain and accept our Terms & Privacy.

Give a Pawfive to this post!


Only registered users can post comments. Please, login or signup.

Start writing about what excites you in tech — connect with developers, grow your voice, and get rewarded.

Join other developers and claim your FAUN.dev() account now!

Avatar

Kaptain #Kubernetes

FAUN.dev()

@kaptain
Kubernetes Weekly Newsletter, Kaptain. Curated Kubernetes news, tutorials, tools and more!
Developer Influence
1

Influence

1

Total Hits

92

Posts