Context
Self hosted docker linux runners created with the given command are creating root owned files in /tmp.
/tmp is the WORKSPACE directory.
This is a security issue as this files could lead to permission escalation when in my pipeline is a script which can damage the host. This script can be executed with root rights on the host when the attacker is on the host system.
What did I try to prevent:
I guess the reason for this is the access to the shared /tmp folder.
Suggestion: Use a anonym docker volume and use it as shared one between the sub containers. Or at least give us the option to do
Anyone have better ideas?
Online forums and learning are now in one easy-to-use experience.
By continuing, you accept the updated Community Terms of Use and acknowledge the Privacy Policy. Your public name, photo, and achievements may be publicly visible and available in search engines.