Well it worked on my machine...🤷♂️
👉 Container bundle everything the app need to run (all its dependencies) in one place.Attackers often seek vulnerability to gain the access to the host system. One way to do this is by access the socket which usually found at var/run/docker.sock This is what we did in the AoC today, exploiting this misconfiguration and take back the control of our website.
After today I immediately go check my docker.sock file and phew! I was safe! (at least from socket exposure)
last modified: 2025-12-14