The pod was healthy. The logs were clean. But something was already inside.
Nmap Sidecar Injection is the quiet breach that lives in plain sight. It uses Kubernetes’ sidecar pattern against you. A harmless-looking container runs next to your app, sharing the same network namespace. It’s invisible to most metrics. If the sidecar is hostile, it can run Nmap scans inside your cluster, mapping every open port, service, and endpoint. The attacker doesn’t need to break through your main container. They’re already parked next door.
This attack blends into normal workloads. Service mesh, logging agents, monitoring tools—these often run as sidecars. An injected Nmap sidecar can sweep your entire internal network without triggering external perimeter defenses. By default, Kubernetes doesn’t isolate containers in the same pod’s network namespace. That means one container can see everything the other sees.
The risk grows in clusters with loose RBAC or automated CI/CD pipelines. A compromised build step can add a malicious sidecar into your deployment manifest. Even a single YAML edit can open the door. Once deployed, the attacker has instant reconnaissance inside your most trusted network zone.