One misstep, one unguarded permission, and your cluster becomes wide open. Attackers don’t need a high‑tech exploit—sometimes a simple socat tunnel is enough to bypass expectations and bridge into restricted zones.
Kubernetes Role-Based Access Control (RBAC) exists to define who can do what. It is precise by design, but configurations often get sloppy. Over-permissive roles. Wildcard verbs. Binding powerful roles to default service accounts. Each of these mistakes erodes the guardrails that keep workloads contained.
The socat utility, often used for debugging, can turn into a stealth gateway when paired with weak RBAC. A compromised pod with network access can proxy traffic to internal APIs. Without strict guardrails, a curious or malicious actor can pivot through that channel, escalating privileges or exfiltrating data. This is not theoretical—it is a documented attack path that shows how infrastructure-level tools can bypass logical boundaries.