Seccomp Confinement Disabled
highService disables seccomp which restricts system calls, significantly increasing attack surface
Service disables seccomp which restricts system calls, significantly increasing attack surface
Experiment with the vulnerable code and security rule below. Edit the code to see how the rule detects different vulnerability patterns.
pathfinder scan --rule cpf/compose-seccompExplore related security rules for Docker Compose
Detects services running with privileged mode which disables container isolation
Service mounts Docker socket providing unrestricted root access to host
Service uses host network mode bypassing Docker network isolation
Common questions about Seccomp Confinement Disabled
Use Code Pathfinder to scan your Docker Compose codebase and automatically detect instances of this vulnerability pattern. Install Code Pathfinder and run the following command in your project directory:
pathfinder scan --rule cpf/compose-seccompThis rule is aligned with industry-standard security frameworks and classifications: