# FAQ ## security: file 'foo' is not in or below 'bar' v2.0 added a security check that prevents kustomizations from reading files outside their own directory root. This was meant to help protect the person inclined to download kustomization directories from the web and use them without inspection to control their production cluster (see [#693](/../../issues/693), [#700](/../../pull/700), [#995](/../../pull/995) and [#998](/../../pull/998)) Resources (including configmap and secret generators) can _still be shared_ via the recommended best practice of placing them in a directory with their own kustomization file, and referring to this directory as a [`base`](glossary.md#base) from any kustomization that wants to use it. This encourages modularity and relocatability. To disable this, use v3, and the `load_restrictor` flag: ``` kustomize build --load_restrictor none $target ``` ## Some field is not transformed by kustomize Example: [#1319](/../../issues/1319), [#1322](/../../issues/1322), [#1347](/../../issues/1347) and etc. The fields transformed by kustomize is configured explicitly in [defaultconfig](/api/konfig/builtinpluginconsts/defaultconfig.go). The configuration itself can be customized by including `configurations` in `kustomization.yaml`, e.g. ```yaml apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization configurations: - kustomizeconfig.yaml ``` The configuration directive allows customization of the following transformers: ```yaml commonAnnotations: [] commonLabels: [] nameprefix: [] namespace: [] varreference: [] namereference: [] images: [] replicas: [] ``` To persist the changes to default configuration, submit a PR like [#1338](/../../pull/1338), [#1348](/../../pull/1348) and etc.