Skip to content

Namespace Compromise via hostPID #1858

@zyue110026

Description

@zyue110026

We identified the usage of hostPID in your Kubernetes manifest enables unauthorized namespace access and container introspection. Processes inside the container can observe or interfere with other workloads running on the node, violating container isolation.

We provide supporting evidence from Kubernetes Pod Security Standards (Baseline & Restricted) and https://github.com/BishopFox/badPods/tree/main/manifests/hostpid which explicitly discourage hostPID: true unless absolutely required, due to risk of privilege escalation and information disclosure.

Expected Behavior:

do not set hostPID: true unless absolutely required.

Metadata

Metadata

Assignees

No one assigned

    Labels

    chart:ebpfIssues related to opentelemetry-ebpf helm chart

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions