Serverless Attack Vector
I recently thought of a potential attack vector related to serverless. After discussing it with people at AWS it seems that, at least in theory, it is plausible. I have not tested it in my own AWS account for obvious reasons - even a simplified version could get out of control if I make a mistake and the method for stopping it has not been confirmed.