Developers store secrets in the Kubernetes configuration files, for example, as environment variables in the pod configuration. Using those credentials attackers may gain access to additional resources inside and outside the cluster. (See “Applications credentials in configuration files” for more details.)
For an example, please refer to “Applications credentials in configuration files”.