This idea solves nothing, creates unnecessary attack surface and exposes the owner to unknown cloud spend. No place that I have ever worked would greenlight something like this.
If you can't audit what users are doing on a Linux system you have no business pretending you can run a k8s cluster.
(k8s was a ZIRP-fueled evolutionary mistake for most of the industry.)
hard disagree on your last point. k8s powers pretty much all clouds as we know it