[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["難以理解","hardToUnderstand","thumb-down"],["資訊或程式碼範例有誤","incorrectInformationOrSampleCode","thumb-down"],["缺少我需要的資訊/範例","missingTheInformationSamplesINeed","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-09-05 (世界標準時間)。"],[],[],null,["Security Command Center performs [runtime](#runtime) and [control plane](#control-plane)\nmonitoring of Cloud Run resources. For recommended responses to these\nthreats, see [Respond to Cloud Run\nthreat findings](/security-command-center/docs/respond-cloud-run-threats).\n\nRuntime finding types\n\nThe following runtime detections are available with\n[Cloud Run Threat Detection](/security-command-center/docs/cloud-run-threat-detection-overview):\n- [`Execution: Added Malicious Binary Executed`](/security-command-center/docs/findings/threats/cloud-run-added-malicious-binary-executed)\n- [`Execution: Added Malicious Library Loaded`](/security-command-center/docs/findings/threats/cloud-run-added-malicious-library-loaded)\n- [`Execution: Built in Malicious Binary Executed`](/security-command-center/docs/findings/threats/cloud-run-built-in-malicious-binary-executed)\n- [`Execution: Container Escape`](/security-command-center/docs/findings/threats/cloud-run-container-escape)\n- [`Execution: Kubernetes Attack Tool Execution`](/security-command-center/docs/findings/threats/cloud-run-kubernetes-attack-tool-execution)\n- [`Execution: Local Reconnaissance Tool Execution`](/security-command-center/docs/findings/threats/cloud-run-local-reconnaissance-tool-execution)\n- [`Execution: Malicious Python executed`](/security-command-center/docs/findings/threats/cloud-run-malicious-python-executed)\n- [`Execution: Modified Malicious Binary Executed`](/security-command-center/docs/findings/threats/cloud-run-modified-malicious-binary-executed)\n- [`Execution: Modified Malicious Library Loaded`](/security-command-center/docs/findings/threats/cloud-run-modified-malicious-library-loaded)\n- [`Malicious Script Executed`](/security-command-center/docs/findings/threats/cloud-run-malicious-script-executed)\n- [`Malicious URL Observed`](/security-command-center/docs/findings/threats/cloud-run-malicious-url-observed)\n- [`Reverse Shell`](/security-command-center/docs/findings/threats/cloud-run-reverse-shell)\n- [`Unexpected Child Shell`](/security-command-center/docs/findings/threats/cloud-run-unexpected-child-shell)\n\nControl plane finding types\n- The following control plane detections are available with [Event Threat Detection](/security-command-center/docs/concepts-event-threat-detection-overview):\n- [`Execution: Cryptomining Docker Image`](/security-command-center/docs/findings/threats/cloud-run-cryptomining-docker-images)\n- [`Impact: Cryptomining Commands`](/security-command-center/docs/findings/threats/cloud-run-jobs-cryptomining-commands)\n- [`Privilege Escalation: Default Compute Engine Service Account SetIAMPolicy`](/security-command-center/docs/findings/threats/cloud-run-services-set-iam-policy)\n\nWhat's next\n - Learn about [Cloud Run Threat Detection](/security-command-center/docs/cloud-run-threat-detection-overview).\n - Learn how to [respond to Cloud Run threat\n findings](/security-command-center/docs/respond-cloud-run-threats).\n - Refer to the [Threat findings index](/security-command-center/docs/threat-findings-index)."]]