Dangerous Capability Added
highDetects services that add dangerous Linux capabilities like SYS_ADMIN, SYS_MODULE, or SYS_PTRACE which can be used for container escape or privilege escalation.
Detects services that add dangerous Linux capabilities like SYS_ADMIN, SYS_MODULE, or SYS_PTRACE which can be used for container escape or privilege escalation.
Experiment with the vulnerable code and security rule below. Edit the code to see how the rule detects different vulnerability patterns.
pathfinder scan --rule cpf/dangerous-capabilitiesExplore related security rules for Docker Compose
Detects services that mount the Docker socket, giving the container full control over the Docker daemon, equivalent to unrestricted root access to the host.
Detects services using host IPC namespace, allowing the container to share shared memory segments, semaphores, and message queues with the host system.
Detects services using host network mode, which disables network isolation and makes the container share the host's network stack, bypassing Docker's network isolation.
Common questions about Dangerous Capability Added
Use Code Pathfinder to scan your Docker Compose codebase and automatically detect instances of this vulnerability pattern. Install Code Pathfinder and run the following command in your project directory:
pathfinder scan --rule cpf/dangerous-capabilitiesThis rule is aligned with industry-standard security frameworks and classifications: