As of this writing, our kyverno pod policies don't disallow arbitrary host path mounts, which may mean that containers could mount arbitrary host paths from the k8s worker filesystem.
Preventing this using kyverno is easy, see for example: https://kyverno.io/policies/pod-security/baseline/disallow-host-path/disallow-host-path/
If we add a policy similar to that in kyverno, we may need to specify which host files are OK to mount:
- NFS dirs
- dumps dirs
- ldap files
- openstack credentials
- etc
This may not need to be a per-tool policy.