K8s-Container_escape_audit Version 3
K8s-container_escape_audit Version 3๋ ๋์ปค ๋ฐ ์ฟ ๋ฒ๋คํฐ์ค ์ปจํ ์ด๋ ๋ด์์ ํ์ถ ์ทจ์ฝ์ ์ ์ ๊ฒํ๋ ๋ฐฐ์ ์คํฌ๋ฆฝํธ ๋๊ตฌ์ด๋ค. ์ด ๋๊ตฌ๋ ๊ถํ ์์น, ๋ค์์คํ์ด์ค ๊ณต์ , ํ์ผ ์์คํ ๋ง์ดํธ, ์ปค๋ ๋ ธ์ถ, ์ฟ ๋ฒ๋คํฐ์ค ์ค์ ์ค๋ฅ, ํด๋ผ์ฐ๋ ๋ฉํ๋ฐ์ดํฐ ์ ๊ทผ, ์ต๊ทผ CVE ๋ฑ 35๊ฐ์ง ์ฃผ์ ์ ๊ฒ ํญ๋ชฉ์ ํฌํจํ๋ฉฐ, ๊ฐ ํญ๋ชฉ์ ๋ํด ์ํ๋์ ๊ถ๊ณ ์ฌํญ์ ์ ๊ณตํ๋ค. ๋ณด์ ํ๊ฐ ๋ฐ ์นจํฌ ํ ์คํธ๋ฅผ ์ํ ๋๊ตฌ๋ก, ์ค์ ์ด์ ํ๊ฒฝ์์ ํ๊ฐ ์์ด ์ฌ์ฉํด์๋ ์ ๋๋ค. ๋ํ ์ฟ ๋ฒ๋คํฐ์ค ์ก(Job)์ผ๋ก๋ ์คํ ๊ฐ๋ฅํ๋ฉฐ, ์์ธํ ๋ณด๊ณ ์์ JSON ์ถ๋ ฅ ์ต์ ์ ์ง์ํ๋ค.
https://github.com/liamromanis101/K8s-container_escape_audit
#kubernetes #containersecurity #penetrationtesting #containerescape #cve
Today a single malicious container image could be enough to take over a larger fleet of machines and grant an attacker control over confidentiality, integrity and availability of all the workloads running in a Kubernetes cluster and potentially beyond, since clusters often hold secrets and credentials for external services and infrastructure.
In our new article, we outline the seven seas of Kubernetes security โ a set of key security domains that organizations should address to secure Kubernetes effectivelyโฆ
Find out more: https://cirosec.de/en/news/the-seven-seas-of-kubernetes-security/
#blog #kubernetes #cloudnative #devops #containersecurity #cybersecurity
CVE-2026-31431: Copy Fail vs. rootless containers
https://www.dragonsreach.it/2026/05/04/cve-2026-31431-copy-fail-rootless-containers/
#HackerNews #CVE202631431 #CopyFail #rootlessContainers #cybersecurity #containersecurity
@josh.bressers.name scanned 161 MCP containers. Found 9,000 vulnerabilities. 263 were critical.
"Software ages like milk, not wine." His analysis breaks down what's actually being deployed in the MCP ecosystemโand what to do about it.
https://anchore.com/blog/analyzing-the-top-mcp-docker-containers/
Traditional security models treat compliance as a static event. This fails in modern environments because containers are ephemeral. If a vulnerability is found, the container is replaced, not patched. Our blog explores shifting from reactive scanning to proactive policy enforcement.
https://anchore.com/blog/mapping-container-inspection-to-dow-rmf-controls/