You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In order to reduce the attack surface on podtracer deployments find the smallest viable set of permissions for podtracer container and eliminate the root user from there. That means that we may need to run a capability aware container that can raise capabilities from the code itself escalating privileges or temporarily using file caps that can work with the restricted SCC. This is a tough one to try.
The text was updated successfully, but these errors were encountered:
In order to reduce the attack surface on podtracer deployments find the smallest viable set of permissions for podtracer container and eliminate the root user from there. That means that we may need to run a capability aware container that can raise capabilities from the code itself escalating privileges or temporarily using file caps that can work with the restricted SCC. This is a tough one to try.
The text was updated successfully, but these errors were encountered: