

it’s an extra hurdle, but it’s far from a guaranteed barrier. There’s a whole class of exploits called container escapes
(or hypervisor escapes
if you’re dealing with old-school VMs) that specifically focus on escalating an attack from a compromised container into whatever machine is hosting the container.
This is why I still don’t know
sed
andawk
syntax lol. I eventually get the data in the shape I need and then move on, and never imprint how they actually work. Still feel like a script kiddie every time I use them (so once every few years).