Bad actors search for means to flee containers. The concept of deliberately coming into a person to evade security goods has still to get explored. cgroups, Selinux or Apparmor, regular unix permissions, Linux namespaces and Linux Capabilities all do the job jointly to isolate this process in such a way, https://bibisoutherncontainers.com/