hostPath mount can be used by attackers to get access to the underlying host and thus break from the container to the host. (See “Writable hostPath mount” for details).
For an example, please refer to “Writable hostPath mount”.