Abstract
Demo of hack on a mesos environment, how a compromised app running in the environment can evolve in gaining full access to the entire cluster.
Demo of hack on a mesos environment, how a compromised app running in the environment can evolve in gaining full access to the entire cluster.