News

Naor Haziz’s discovery shows how a compromised container on EC2-backed ECS tasks can impersonate the ECS agent and steal IAM ...
While this approach ensures that each task gets credentials for its IAM role and they are delivered at runtime, a leak of the ...