Skip to content

Runtime Protection

Kupe Cloud monitors every running workload for runtime security threats. You do not need to install anything. Results appear in your console under Security > Runtime.

ThreatWhat It DetectsAction
Container escapeProcesses attempting to break out of container isolationBlocked — process terminated immediately
Reverse shellShell processes making outbound network connectionsDetected and alerted
Privilege escalationProcesses changing user/group identity to gain elevated accessDetected and alerted
Sensitive file accessAccess to password files, Kubernetes secrets, or certificatesDetected and alerted
Capability abuseProcesses granting themselves dangerous Linux capabilitiesDetected and alerted
Host accessContainers accessing host infrastructure pathsDetected and alerted

Container escapes are the only threat currently enforced (blocked). All other threats are detected — the platform logs the event and surfaces it in the console, but does not terminate the process. This avoids false positives disrupting legitimate workloads while still giving you visibility.

Navigate to Security > Runtime in the console sidebar. The Runtime page shows:

  • Detection type — what was detected (e.g., “Reverse Shell”, “Privilege Escalation”)
  • Severity — critical or warning
  • Event count — how many times this was detected in the last 24 hours
  • Action — whether the platform blocked the process or only detected it

If the page shows “No runtime security events in the last 24 hours”, your workloads have not triggered any security detections — this is the expected state for healthy applications.

Container escape

Other threats

No threat

Your workload runs

Platform monitors

system calls

Threat

detected?

Process killed

immediately

Event logged

+ shown in console

Normal operation

continues

Kupe continuously monitors workload activity and matches it against known runtime threat patterns. When a threat is detected, Kupe takes action:

  1. Container escapes are stopped immediately before the escape can succeed. Your container will see the offending process terminated with a signal.
  2. Other threats are logged and appear in the console within minutes. Your workload continues running — the detection is informational.

Check the Runtime page periodically, especially after deploying new workloads or third-party images.

Event TypeRecommended Action
Container escape (blocked)Investigate immediately. Something in your container attempted to break out of isolation. Check the image for compromise.
Reverse shellCritical — a process in your container is making outbound connections from a shell. Likely indicates compromise. Investigate the affected pod and image.
Privilege escalationCheck if your application legitimately needs to change user identity. If not, the image may contain unexpected binaries.
Sensitive file accessVerify your application needs access to the reported file. Access to /etc/shadow or service account tokens from application code is unusual.
Capability abuseReview your container’s security context. Applications should not need to grant themselves additional Linux capabilities at runtime.

Container escape attempts are the only runtime threat currently blocked by the platform. Other detections operate in monitoring mode to avoid false positives interrupting healthy workloads. Additional threats may be promoted to enforcement over time.

Runtime protection is enabled on managed clusters.