In their blog post, Rhino Security Labs describe how to weaponize ECS task definitions to steal access keys and other information: https://rhinosecuritylabs.com/aws/weaponizing-ecs-task-definitions-steal-credentials-running-containers/arrow-up-right
Last updated 5 years ago