GCP provides an OS Login service for managing SSH access to compute instances using IAM roles.
An attacker could abuse this feature via LXD, Docker (if available on the target system) and
DHCP poisoning of the metadata server to escalate their privileges on a Google Compute Engine VM.