Information Gathering
Known Attack 1: Abusing GKE/GCP Metadata
Known Attack 2: Escaping to the underlying Node (GCP Compute Instance)
Config weaknesses to try to abuse
Cheat Sheet