PoC: fully unprivileged container escape to node-level code execution on Kubernetes via CVE-2026-31431 page-cache corruption + shared image layers. Validated on Alibaba Cloud ACK and Amazon EKS.
Proof-of-concept tool demonstrating a Linux kernel vulnerability allowing unprivileged containers to execute code at the node level in Kubernetes via shared image layers.
How It Works
You hear about a new weakness in container setups and find this simple test tool to check it safely on your own computers.
You download the tool and prepare a special image that matches parts of your secure system services.
You place the test inside your container area, and it quietly changes shared memory spots without needing special powers.
A powerful background service picks up the hidden change and runs your test code with full access, proving the escape works.
You check the main computer and see a success message, showing the weakness is real in your setup.
You remove the test and restart services to return to normal.
Now you understand the risk and can apply fixes like updating software or isolating services better.
Star Growth
Repurpose is a Pro feature
Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.
Unlock RepurposeSimilar repos coming soon.