Threat Model¶
ZViz's security model and what it protects against.
Trust Boundaries¶
- Untrusted: Container workloads
- Trusted: ZViz broker, Host kernel
In Scope¶
- Container escape via syscalls
- Resource exhaustion
- Network attacks
- Filesystem access
Out of Scope¶
- Kernel vulnerabilities
- Hardware attacks
- Supply chain attacks
See Security Policy for details.