This document discusses container security and demonstrates how privileges can be escalated in Kubernetes clusters. It covers security mechanisms for containers like rootless containers and privilege dropping. It then demonstrates how a user can escalate privileges by mounting host secrets or escaping containers to gain host access. The document concludes that while orchestration platforms improve security, following security best practices like least privilege pods and RBAC are needed. It advocates that all users should fear privileged containers.