Secure Boot — why the boot chain is the most dangerous attack surface.
Every security tool you run — your firewall, your EDR, your antivirus, your container runtime — loads after the kernel. If an attacker gets code running before the kernel, they own everything that comes after it. Your security tools can't detect what's already beneath them.
The uncomfortable reality: A motivated teenager with YouTube and a Kali Linux VM can download pre-built rootkit frameworks, bootkit toolkits, and UEFI attack tools that do the hard work for them. The knowledge barrier is nearly gone. Tools like BootHole, BlackLotus, and CosmicStrand are publicly documented with working proof-of-concept code.
What a boot-level rootkit can do
It loads before your OS
A rootkit in the UEFI firmware or bootloader loads before the kernel, before your antivirus, before your EDR, before your security tools even exist in memory. It can subvert everything that loads after it — including the kernel itself.
It survives reinstalls
UEFI rootkits live in firmware, not on disk. Reinstalling the OS doesn't help. Reformatting doesn't help. Some survive firmware flashes. The only reliable fix is replacing the hardware.
The boot chain
Every system boots through a chain of stages. Each stage loads the next. Secure Boot means each stage cryptographically verifies the next before handing off control. If any link is unsigned or tampered with, the chain breaks and the system refuses to boot.
Without Secure Boot
The Kubernetes nightmare
This isn't theoretical. Here's what happens when a rootkit meets a Kubernetes cluster that doesn't verify boot integrity:
The attack chain
The rootkit loads before the OS. It reads the kubelet's TLS client certificate from memory. It presents that cert to the Kubernetes API server. The API server sees a valid cert signed by the cluster CA — the TLS handshake succeeds. The rootkit now has legitimate node-level access to the cluster.
The blast radius
With a stolen kubelet cert: read all secrets across every namespace the node touches. Inject containers into running pods. Exfiltrate the etcd database. Pivot to every node the compromised identity can reach. All over valid TLS. All with valid certs. Completely invisible to standard monitoring.
Where kldloadOS stands
- ✓ UEFI Secure Boot
- ✓ MOK-signed DKMS modules (ZFS, WireGuard, NVIDIA)
- ✓ ZFS integrity checking (every block checksummed)
- ✓ WireGuard encryption at second zero
- ✓ eBPF observability from kernel load
- ✗ TPM-2 measured boot (planned)
- ✗ Remote attestation before cluster admission (planned)
- ✗ Kubernetes admission webhook verifying boot integrity (planned)
The full solution
The complete chain looks like this:
Secure Boot verifies the bootloader, kernel, and modules. TPM-2 measures every stage and seals secrets against those measurements. Remote attestation (Keylime or similar) lets the cluster ask each node: "prove your boot chain was clean before I accept your credentials." Kubernetes admission control refuses nodes that can't prove clean boot. Cilium network policy limits blast radius even if a node is compromised.
kldloadOS has the first two layers today. The attestation layer is on the roadmap. But even without it — most enterprise Linux deployments ship with Secure Boot disabled, unsigned modules, no TPM attestation, and a boot process a motivated teenager could subvert.
The bar is low. kldloadOS is already above it.