It downloads things without checking signatures by default. And even if you enable DCT, it TOFUs every key without even asking or checking against a WoT
The bright side is, that you run it in a container. Beware of privileged mode, don’t give it unnecessary mounts or networks, and there’s very little some malicious code can do.
If you’re using it for a build system, tough luck but you need to manage the keys to avoid TOFU, and ideally pull from your own registry.
A container that has access to all the data on the database. All the users data is compromised. And the attacked can execute malicious JavaScript on the users.
There’s nothing bright about using docker. Its a huge risk.
jagged_circle@feddit.nl 3 days ago
It downloads things without checking signatures by default. And even if you enable DCT, it TOFUs every key without even asking or checking against a WoT
jarfil@beehaw.org 3 days ago
The bright side is, that you run it in a container. Beware of privileged mode, don’t give it unnecessary mounts or networks, and there’s very little some malicious code can do.
If you’re using it for a build system, tough luck but you need to manage the keys to avoid TOFU, and ideally pull from your own registry.
jagged_circle@feddit.nl 3 days ago
A container that has access to all the data on the database. All the users data is compromised. And the attacked can execute malicious JavaScript on the users.
There’s nothing bright about using docker. Its a huge risk.