Interactive Playground
Experiment with the vulnerable code and security rule below. Edit the code to see how the rule detects different vulnerability patterns.
pathfinder scan --ruleset docker-compose/COMPOSE-SEC-002 --project .About This Rule
Understanding the vulnerability and how it is detected
This rule detects docker-compose services that mount the Docker socket (/var/run/docker.sock or /run/docker.sock) as a volume. The Docker socket is owned by root and provides complete control over the Docker daemon. Giving a container access to it is equivalent to giving unrestricted root access to the host system.
This is identical to DOCKER-SEC-006 but for docker-compose configurations.
How to Fix
Recommended remediation steps
- 1Never mount the Docker socket into application containers
- 2Use the Docker API over TLS with client certificates if remote access is needed
- 3Consider rootless Docker or Podman to reduce socket exposure risk
References
External resources and documentation
Similar Rules
Explore related security rules for Docker Compose
Container Filesystem is Writable
Service has writable root filesystem. Consider making it read-only for better security.
Using Host IPC Mode
Service uses host IPC namespace. Container shares inter-process communication with host.
Missing no-new-privileges Security Option
Service does not have no-new-privileges security option. Without this, processes inside the container can gain additional privileges via setuid binaries or capability escalation.
Frequently Asked Questions
Common questions about Docker Socket Exposed to Container
New feature
Get these findings posted directly on your GitHub pull requests
The Docker Socket Exposed to Container rule runs in CI and posts inline review comments on the exact lines — no dashboard, no SARIF viewer.