An example showing how an overly permissive container environment can be exploited to install and run cryptomining software on a host system.