Docker Socket Exposed to Container
CRITICALService mounts Docker socket. The owner of this socket is root. Giving container access to it is equivalent to giving unrestricted root access to host.
Service mounts Docker socket. The owner of this socket is root. Giving container access to it is equivalent to giving unrestricted root access to host.
Experiment with the vulnerable code and security rule below. Edit the code to see how the rule detects different vulnerability patterns.
pathfinder ci --ruleset docker-compose/COMPOSE-SEC-002 --project .Explore related security rules for Docker Compose
Service uses host IPC namespace. Container shares inter-process communication with host.
Service does not have 'no-new-privileges:true' in security_opt. This allows
Service has 'label:disable' in security_opt, which disables SELinux mandatory
Common questions about Docker Socket Exposed to Container
Use Code Pathfinder to scan your Docker Compose codebase and automatically detect instances of this vulnerability pattern. Install Code Pathfinder and run the following command in your project directory:
pathfinder ci --ruleset docker-compose/COMPOSE-SEC-002 --project .This rule is aligned with industry-standard security frameworks and classifications: