So you’ve followed best practices and configured your container to use a user other than root for its requirements. Nice job. The security experts are convinced this will keep your container, pod, and cluster all more secure. However, sometime in the near future, a completely unforeseen and impossible issue pops