Information Gathering

Known Attack 1: Abusing GKE/GCP Metadata

Known Attack 2: Escaping to the underlying Node (GCP Compute Instance)

Config weaknesses to try to abuse

Cheat Sheet