Your Kubernetes security monitoring system flagged suspicious activity from container web-app-7f9c4b running in namespace production at 14:30 UTC on November 28, 2025. Container runtime logs show unusual /proc filesystem access, privileged operations, and host filesystem mounting attempts. Your mission is to analyze Docker/Kubernetes logs to determine if a container escape was attempted or achieved.
Container escapes occur when an attacker breaks out of container isolation to access the host system. This is one of the most critical security threats in containerized environments, potentially compromising entire Kubernetes clusters.
Complete Host Access: Successful escape grants root access to underlying host OS
Cluster Compromise: Access to host allows lateral movement to other containers/nodes
Data Breach: Can access secrets, credentials, and data from all containers on host
Persistence: Attacker can install backdoors on host that survive container restarts
Namespaces: Process, network, mount, UTS, IPC, user isolation
Cgroups: Resource limits (CPU, memory, I/O)
Capabilities: Fine-grained privilege control (replaces root/non-root)
Seccomp: System call filtering
AppArmor/SELinux: Mandatory access control
What it means: docker run --privileged or securityContext.privileged: true
Grants: All Linux capabilities, access to all devices, disables AppArmor/SELinux
Risk: Container has same permissions as host root - trivial to escape
Legitimate Uses: Docker-in-Docker, system monitoring tools (very rare)
π¨ Critical Defense: NEVER run containers as privileged unless absolutely necessary. Drop all capabilities by default, use read-only root filesystems, enable seccomp/AppArmor, and implement Pod Security Standards/Policies.
Run commands to analyze container security. Available: docker, kubectl, cat, grep, clear, help
This section auto-fills once all tasks are completed correctly.
Complete all tasks to reveal the container escape chain.
The container escape succeeded because:
1. Container ran in privileged mode (privileged: true) - grants all host capabilities
2. CAP_SYS_ADMIN capability allowed mounting host filesystem
3. Running as UID 0 (root) instead of non-root user
4. No Pod Security Policy/Standards enforcement
5. No runtime security monitoring (Falco, Sysdig)
6. No read-only root filesystem restriction
β Privileged mode enabled
β Dangerous capabilities added (CAP_SYS_ADMIN)
β Running as root (UID 0)
β No seccomp profile applied
β No AppArmor/SELinux enforcement
β Writable root filesystem
β No resource limits set
β Production namespace without proper PSP/PSS