I'd like to introduce a possibly new class of serverless security flaws with a
story.
For our training business at we45, we orchestrate servers. A lot of servers.
These servers are used by our many students to practice and learn concepts
around Application Security, Cloud Security, Kubernetes Security,