How Tech - Systems Programming

How Tech - Systems Programming

eBPF for Security: Implementing Custom Policy Enforcement and Runtime Sandboxing

Mar 23, 2026
∙ Paid

When a container escaped our production Kubernetes cluster last year, the postmortem revealed something interesting: our seccomp filters blocked 95% of dangerous syscalls, but the attacker used execveat() with a memfd - a path we hadn’t considered. Traditional security mechanisms failed because they’re static. Once loaded, seccomp profiles don’t adapt. …

User's avatar

Continue reading this post for free, courtesy of Systems.

Or purchase a paid subscription.
© 2026 Sumedh S · Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture