This document discusses container security and potential attacks. It begins with an overview of existing container security features like non-root users, namespaces, and seccomp profiles. It then discusses potential attacks like cryptocurrency mining malware, kernel/host attacks that bypass security restrictions, and network-level attacks. Throughout, it provides examples of how to detect and mitigate these risks using tools like Falco, network policies, and restricting egress traffic. The overall message is that containers can improve security but are not a silver bullet, and visibility and limiting what containers can access is important.