▲ | mbreese 2 days ago | |||||||
If you want to be able to spin up CI/CD containers, don’t you kinda already need to have docker socket access? In that case, you’ve already decided that this isn’t a threat vector you’re concerned about. Yes, this probably makes it easier, but the ability to startup new containers for CI/CD is what makes this threat possible. So, I’m not sure this is something I’d worry much about. Perhaps they should flag this in the documentation as something to be noted, but otherwise, I’m not sure how else you get this functionality. Is there another way? | ||||||||
▲ | soraminazuki 2 days ago | parent | next [-] | |||||||
It's a multi-user Git / CI /CD / project management platform. If you introduce this in your organization, a single vulnerability can take down the entire system and any other application running on the same host. You can't just "decide that this isn’t a threat vector" without taking the use case into account. Or at least it should come with alarm bells warning users that it's unsafe. | ||||||||
| ||||||||
▲ | hebocon 2 days ago | parent | prev [-] | |||||||
Running a binary as a non-root user with scoped access to Docker commands seems more appropriate to me. | ||||||||
|