Sharing this blog post we published on 8 insecure Kubernetes pod configurations and the corresponding methods for achieving privilege escalation. While it’s intended for pentesters to an extent, it’s also useful information for Kubernetes administrators to better understand common misconfiguration scenarios. Feel free to leave feedback in the comments; thanks for reading!