Docker containers share the host kernel. Namespaces ≠ sandbox.

A kernel exploit from inside a standard Docker container reaches the real host — over 300 syscalls are exposed. gVisor (Google's open-source user-space kernel) cuts that to ~20.

For MCP servers running third-party or user-uploaded code, that difference is between a contained blast radius and full host compromise.

https://mistaike.ai/blog/docker-not-a-sandbox

#MCPSecurity #gVisor #Docker #Security #MCP