See the comprehensive container attacks content in ../01-threat-modeling/01-container-security.md
- Privilege escalation via mounts
- Container escape via kernel exploits
- Image tampering and supply chain attacks
- Network attacks and lateral movement
- DoS and resource exhaustion
- Real-world attack examples
- Detection techniques
- Attack demonstrations
For complete details, examples, and mitigation strategies, refer to the Common Container Attacks section.