Files
falco/examples/bad-mount-cryptomining/attacker_files/config_1.json
Mark Stemm a3f53138d3 Example showing cryptomining exploit (#336)
An example showing how an overly permissive container environment can be
exploited to install and run cryptomining software on a host system.
2018-03-16 15:17:39 -07:00

2 lines
50 B
JSON

{"config": "some-bitcoin-miner-config-goes-here"}