A single bad commit can open a door you did not mean to leave unlocked. Privilege escalation is that door — small at first, then wide enough for an attacker to own your systems. Pain point privilege escalation happens when the cracks start not in code exploits, but in process, design, and overlooked dependencies.
Attackers thrive on weak boundaries between roles and permissions. A user account given temporary admin rights without a strict expiry. An API with an undocumented elevated endpoint. Misconfigured container runtimes with broad capabilities. Each is a pain point. Stack them, and privilege escalation becomes almost effortless.
The risk is amplified in microservices and cloud-native setups. Permissions spread across IAM roles, Kubernetes RBAC rules, CI/CD pipelines, and serverless functions. One wrong binding or inherited role can cascade. Audit logs often look clean until you trace effective permissions, not just assigned ones. The gap between intent and reality is where escalation hides.