CatsCrdl

CatsCrdl

Daniel's thoughts on infosec

Container Escape Telemetry, Part 1: Isolation Primitives and the eBPF Observability Model

Before you can detect a container escape, you need to understand what's being escaped. This post covers the Linux isolation primitives that containers rely on, why they break, and how eBPF-based security tools observe those breakdowns at the kernel level.

Daniel Wyleczuk-Stern

13-Minute Read

This is Part 1 of the container escape telemetry series. The series overview has the project goals, key findings, and reading guide. If you’re already comfortable with namespaces, cgroups, capabilities, and how eBPF ring buffers work, skip ahead to Part 2: Methodology and Tool Architecture.

Container Escape Telemetry, Part 2: Methodology and Tool Architecture

The lab setup, scenario matrix, and tool comparison framework behind the container escape telemetry research. Three eBPF tools, 15 scenarios, one tool per VM, and a PowerShell harness that ties it all together.

Daniel Wyleczuk-Stern

16-Minute Read

This is Part 2 of the container escape telemetry series (overview). Part 1 covered the isolation primitives and eBPF observability model. This post covers the lab architecture, the three tools under test, the 15 escape scenarios, and the detection coverage matrix. If you want to skip straight to what the telemetry actually looks like, jump to Part 3: Per-Scenario Deep Dives.

Container Escape Telemetry, Part 3: What Each Tool Actually Captured

Per-scenario telemetry breakdowns from 15 container escape and stress-test scenarios across Tetragon, Falco, and Tracee. The raw data behind the detection scores, and six patterns every container security deployment should monitor.

Daniel Wyleczuk-Stern

15-Minute Read

This is Part 3 of the container escape telemetry series (overview). Part 1 covered isolation primitives and the eBPF observability model. Part 2 covered the lab, the tools, and the detection coverage matrix. This post is the meat: per-scenario telemetry breakdowns showing what each tool actually captured, where the qualitative differences behind the checkmarks become concrete.

Recent Posts

Categories

About

A random collection of thoughts on cybersecurity.