Last updated 4 years ago
In their blog post, Rhino Security Labs describe how to weaponize ECS task definitions to steal access keys and other information: