Security
Critical security rules for preventing vulnerabilities
Run All Security Rules
pathfinder scan --ruleset cpf/docker-compose/securityRules
Using Host IPC Mode
MEDIUMService uses host IPC namespace. Container shares inter-process communication with host.
Missing no-new-privileges Security Option
MEDIUMService does not have 'no-new-privileges:true' in security_opt. This allows
SELinux Separation Disabled
MEDIUMService has 'label:disable' in security_opt, which disables SELinux mandatory
Container Filesystem is Writable
LOWService has writable root filesystem. Consider making it read-only for better security.
Dangerous Capability Added
HIGHService adds dangerous capability. These capabilities can be used for container escape or privilege escalation.
Docker Socket Exposed to Container
CRITICALService mounts Docker socket. The owner of this socket is root. Giving container access to it is equivalent to giving unrestricted root access to host.
Using Host Network Mode
HIGHService uses host network mode. Container shares host network stack, bypassing network isolation.
Using Host PID Mode
HIGHService uses host PID namespace. Container can see and potentially signal host processes.
Service Running in Privileged Mode
CRITICALService is running in privileged mode. This grants container equivalent of root capabilities on the host machine. Can lead to container escapes and privilege escalation.
Seccomp Confinement Disabled
HIGHService disables seccomp profile. Container can use all system calls, increasing attack surface.