cm0002@lemmy.world to Programmer Humor@programming.dev · 22 hours agoHow Docker was bornlemmy.mlimagemessage-square32fedilinkarrow-up1704arrow-down117cross-posted to: programmerhumor@lemmy.ml
arrow-up1687arrow-down1imageHow Docker was bornlemmy.mlcm0002@lemmy.world to Programmer Humor@programming.dev · 22 hours agomessage-square32fedilinkcross-posted to: programmerhumor@lemmy.ml
minus-squareroofuskit@lemmy.worldlinkfedilinkEnglisharrow-up2·17 hours agoThey worry about someone replacing the docker image on the hosting server with a malicious modified version for people to pull down during updates.
minus-squarezalgotext@sh.itjust.workslinkfedilinkarrow-up7·17 hours agoThis worry exists for literally every 3rd party dependency, not just docker, and is addressed the same way - by running tests and vulnerability scans in a sandboxed test environment before shipping to prod
minus-squareroofuskit@lemmy.worldlinkfedilinkEnglisharrow-up2·16 hours agoI was just answering a question. I had the same response above.
minus-squarezalgotext@sh.itjust.workslinkfedilinkarrow-up2·16 hours agoAnd I was just adding extra details
They worry about someone replacing the docker image on the hosting server with a malicious modified version for people to pull down during updates.
This worry exists for literally every 3rd party dependency, not just docker, and is addressed the same way - by running tests and vulnerability scans in a sandboxed test environment before shipping to prod
I was just answering a question. I had the same response above.
And I was just adding extra details