Attackers may attempt to gain access to the underlying host from a compromised container. (See “Writable hostPath mount” for more details.)
For an example, please refer to “Writable hostPath mount”.