| ▲ | ronsor 5 days ago | |||||||||||||||||||||||||||||||||||||
There would be, but a lot of docker containers are misconfigured or unnecessarily privileged, allowing for escape. Also, if you've been compromised, you may have a rootkit that hides itself from the filesystem, so you can't be sure of a file's existence through a simple `ls` or `stat`. | ||||||||||||||||||||||||||||||||||||||
| ▲ | miladyincontrol 5 days ago | parent [-] | |||||||||||||||||||||||||||||||||||||
> but a lot of docker containers are misconfigured or unnecessarily privileged, allowing for escape Honestly, citation needed. Very rare unless you're literally giving the container access to write to /usr/bin or other binaries the host is running, to reconfigure your entire /etc, access to sockets like docker's, or some other insane level of over reach I doubt even the least educated docker user would do. While of course they should be scoped properly, people act like some elusive 0-day container escape will get used on their minecraft server or personal blog that has otherwise sane mounts, non-admin capabilities, etc. You arent that special. | ||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||