Mounting host directories or using default networks can expose your host file system or allow unintended container-to-host or container-to-container communication. Mitigation practices include: limiting container privileges, restricting mount points to specific directories, using user namespaces, avoiding bind mounts of sensitive host paths, defining explicit networks rather than default, implementing network policies (in orchestrators) or firewalls between containers, and scanning container images for vulnerabilities. Understanding both storage and network attack surfaces is important for production readiness.