Characterizing Trust Boundary Vulnerabilities in TEE Containers