eBPF for Security: Implementing Custom Policy Enforcement and Runtime Sandboxing
When a container escaped our production Kubernetes cluster last year, the postmortem revealed something interesting: our seccomp filters blocked 95% of dangerous syscalls, but the attacker used
execveat()with a memfd - a path we hadn’t considered. Traditional security mechanisms failed because they’re static. Once loaded, seccomp profiles don’t adapt. …

