Skip to main content
Glama
privilege-escalation.yaml514 B
# 1. Allowing process privilege escalations exposes the Pod to attacks that exploit setuid binaries. # MITRE, CWE-284 - Improper Access Control # Linux Kernel Archives, no_new_privs - Official docs # 2. Containers lack resource limits --- apiVersion: v1 kind: Pod metadata: name: example spec: containers: - name: web image: nginx ports: - name: web containerPort: 80 protocol: TCP securityContext: allowPrivilegeEscalation: true # Sensitive

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/michoo/security_mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server